ALASPOSTGRESQL14-2024-005

Related Vulnerabilities: CVE-2023-5869  

While modifying certain SQL array values, missing overflow checks let authenticated database users write arbitrary bytes to a memory area that facilitates arbitrary code execution. Missing overflow checks also let authenticated database users read a wide area of server memory. The CVE-2021-32027 fix covered some attacks of this description, but it missed others. (CVE-2023-5869)

ALASPOSTGRESQL14-2024-005


Amazon Linux 2 Security Advisory: ALASPOSTGRESQL14-2024-005
Advisory Release Date: 2024-01-19 02:20 Pacific
Advisory Updated Date: 2024-01-19 02:20 Pacific
Severity: Important

Issue Overview:

While modifying certain SQL array values, missing overflow checks let authenticated database users write arbitrary bytes to a memory area that facilitates arbitrary code execution. Missing overflow checks also let authenticated database users read a wide area of server memory. The CVE-2021-32027 fix covered some attacks of this description, but it missed others. (CVE-2023-5869)


Affected Packages:

libpq


Note:

This advisory is applicable to Amazon Linux 2 - Postgresql14 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update libpq to update your system.

New Packages:
aarch64:
    libpq-14.10-1.amzn2.0.1.aarch64
    libpq-devel-14.10-1.amzn2.0.1.aarch64
    libpq-debuginfo-14.10-1.amzn2.0.1.aarch64

src:
    libpq-14.10-1.amzn2.0.1.src

x86_64:
    libpq-14.10-1.amzn2.0.1.x86_64
    libpq-devel-14.10-1.amzn2.0.1.x86_64
    libpq-debuginfo-14.10-1.amzn2.0.1.x86_64