Debian Security Advisory
DSA-5554-1 postgresql-13 -- security update
- Date Reported:
- 13 Nov 2023
- Affected Packages:
- postgresql-13
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2023-5868, CVE-2023-5869, CVE-2023-5870, CVE-2023-39417.
- More information:
-
Several vulnerabilities have been discovered in the PostgreSQL database system.
- CVE-2023-5868
Jingzhou Fu discovered a memory disclosure flaw in aggregate function calls.
- CVE-2023-5869
Pedro Gallegos reported integer overflow flaws resulting in buffer overflows in the array modification functions.
- CVE-2023-5870
Hemanth Sandrana and Mahendrakar Srinivasarao reported that the pg_cancel_backend role can signal certain superuser processes, potentially resulting in denial of service.
- CVE-2023-39417
Micah Gate, Valerie Woolard, Tim Carey-Smith, and Christoph Berg reported that an extension script using @substitutions@ within quoting may allow to perform an SQL injection for an attacker having database-level CREATE privileges.
For the oldstable distribution (bullseye), these problems have been fixed in version 13.13-0+deb11u1.
We recommend that you upgrade your postgresql-13 packages.
For the detailed security status of postgresql-13 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/postgresql-13
- CVE-2023-5868