drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen von Code mit höheren Privilegien in postgresql13
Name: |
Ausführen von Code mit höheren Privilegien in postgresql13 |
|
ID: |
RHSA-2022:4855-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux |
|
Datum: |
Do, 2. Juni 2022, 06:41 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2022-1552 |
|
Applikationen: |
PostgreSQL |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: postgresql:13 security update Advisory ID: RHSA-2022:4855-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:4855 Issue date: 2022-06-01 CVE Names: CVE-2022-1552 =====================================================================
1. Summary:
An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: postgresql (13.7).
Security Fix(es):
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
If the postgresql service is running, it will be automatically restarted after installing this update.
5. Bugs fixed (https://bugzilla.redhat.com/):
2081126 - CVE-2022-1552 postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source: pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552.src.rpm pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.src.rpm postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.src.rpm postgresql-13.7-2.module+el8.6.0+15347+b8eabcef.src.rpm
aarch64: pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552.aarch64.rpm pg_repack-debuginfo-1.4.6-3.module+el8.5.0+11357+bcc62552.aarch64.rpm pg_repack-debugsource-1.4.6-3.module+el8.5.0+11357+bcc62552.aarch64.rpm pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.aarch64.rpm pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.aarch64.rpm pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.aarch64.rpm postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.aarch64.rpm postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.aarch64.rp m postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.aarch64.rp m postgresql-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-contrib-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-contrib-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-debugsource-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-docs-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-docs-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-plperl-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-plperl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-plpython3-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-plpython3-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-pltcl-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-pltcl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-server-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-server-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-server-devel-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-server-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rp m postgresql-static-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-test-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-test-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-upgrade-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-upgrade-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-upgrade-devel-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rpm postgresql-upgrade-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.aarch64.rp m
noarch: postgresql-test-rpm-macros-13.7-2.module+el8.6.0+15347+b8eabcef.noarch.rpm
ppc64le: pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552.ppc64le.rpm pg_repack-debuginfo-1.4.6-3.module+el8.5.0+11357+bcc62552.ppc64le.rpm pg_repack-debugsource-1.4.6-3.module+el8.5.0+11357+bcc62552.ppc64le.rpm pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.ppc64le.rpm pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.ppc64le.rpm pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.ppc64le.rpm postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.ppc64le.rpm postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.ppc64le.rp m postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.ppc64le.rp m postgresql-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-contrib-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-contrib-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-debugsource-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-docs-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-docs-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-plperl-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-plperl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-plpython3-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-plpython3-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-pltcl-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-pltcl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-server-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-server-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-server-devel-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-server-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rp m postgresql-static-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-test-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-test-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-upgrade-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-upgrade-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-upgrade-devel-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rpm postgresql-upgrade-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.ppc64le.rp m
s390x: pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552.s390x.rpm pg_repack-debuginfo-1.4.6-3.module+el8.5.0+11357+bcc62552.s390x.rpm pg_repack-debugsource-1.4.6-3.module+el8.5.0+11357+bcc62552.s390x.rpm pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.s390x.rpm pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.s390x.rpm pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.s390x.rpm postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.s390x.rpm postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.s390x.rpm postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.s390x.rp m postgresql-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-contrib-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-contrib-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-debugsource-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-docs-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-docs-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-plperl-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-plperl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-plpython3-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-plpython3-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-pltcl-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-pltcl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-server-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-server-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-server-devel-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-server-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rp m postgresql-static-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-test-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-test-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-upgrade-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-upgrade-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-upgrade-devel-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rpm postgresql-upgrade-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.s390x.rp m
x86_64: pg_repack-1.4.6-3.module+el8.5.0+11357+bcc62552.x86_64.rpm pg_repack-debuginfo-1.4.6-3.module+el8.5.0+11357+bcc62552.x86_64.rpm pg_repack-debugsource-1.4.6-3.module+el8.5.0+11357+bcc62552.x86_64.rpm pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rp m postgresql-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-contrib-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-contrib-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-debugsource-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-docs-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-docs-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-plperl-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-plperl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-plpython3-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-plpython3-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-pltcl-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-pltcl-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-server-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-server-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-server-devel-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-server-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rp m postgresql-static-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-test-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-test-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-upgrade-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-upgrade-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-upgrade-devel-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rpm postgresql-upgrade-devel-debuginfo-13.7-2.module+el8.6.0+15347+b8eabcef.x86_64.rp m
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-1552 https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYpgdwtzjgjWX9erEAQg+Gg/+O1VBRVhBxtEipbQ3BDMMBnGpTHNwcMM6 RbliF6ItstLHH/tF5GV2yVOOP66fOCaHIOVgUzx42+bGCgOVd61F611rntI6++3f ZLhk4J0OsDHSa9Oi3kRwsfkwz8rYWpbW//4UvNHH1445isRVAwGFLxgtMqpDo6Ey m2lNg22ntXM7Unn7dVQKsstAkyza123TeyAfd/YG+HA2hpst3L1/kZYUVqmdJ4BF Ub5e4i0tP/jOjEgGEguDAZnP8fCcGEDFBkO8pCMkcMG/Bxr+NgQxDazzbiZPOAIU VRrByR8/NMR6aWlAeucJ8sVKABdpVrC4Pub0XG6DH3DdyBvus9fQ7pGOA/qazfpR YsfjfFr4wLK/4LVis5rlbNAPpea0YNx0UM+fV7mLyqv66JuAYEhYvqnZeA1apDqG o6k+LV5CIuTVgQjNQmiI5eYFB/qXIjoa+I95kJhieTpBpOj+Ow/iUsuh+ddwHWvC eHtcWz4y7Ca0srETnv70a1i2KENvCIyd8tS1j1WedZo7abiSrz7dnPVVKFUgDCel eSRZeeyXiXlM6J6uvcswMQnMs+k5+dtm5eW+aC0osbjPIai1lRIjI3FeCpGBBwmc /tIE7pgQfjymoABResaDBznliaLeJwbCVqS0PUnKqWQHO2Z2ikztutPEV/QXe5SW GRX904QBukU= =LLYn -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|