Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-5868 CVE-2023-5869 CVE-2023-5870 |
CWE-ID | CWE-200 CWE-190 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system postgresql-test-rpm-macros Operating systems & Components / Operating system package or component postgresql-upgrade-devel Operating systems & Components / Operating system package or component postgresql-upgrade Operating systems & Components / Operating system package or component postgresql-test Operating systems & Components / Operating system package or component postgresql-static Operating systems & Components / Operating system package or component postgresql-server-devel Operating systems & Components / Operating system package or component postgresql-server Operating systems & Components / Operating system package or component postgresql-private-libs Operating systems & Components / Operating system package or component postgresql-private-devel Operating systems & Components / Operating system package or component postgresql-pltcl Operating systems & Components / Operating system package or component postgresql-plpython3 Operating systems & Components / Operating system package or component postgresql-plperl Operating systems & Components / Operating system package or component postgresql-docs Operating systems & Components / Operating system package or component postgresql-contrib Operating systems & Components / Operating system package or component postgresql Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU82941
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5868
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the aggregate function calls when handling "unknown"-type arguments. A remote user can read parts of system memory.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
postgresql-test-rpm-macros: before 15.5-1
postgresql-upgrade-devel: before 15.5-1
postgresql-upgrade: before 15.5-1
postgresql-test: before 15.5-1
postgresql-static: before 15.5-1
postgresql-server-devel: before 15.5-1
postgresql-server: before 15.5-1
postgresql-private-libs: before 15.5-1
postgresql-private-devel: before 15.5-1
postgresql-pltcl: before 15.5-1
postgresql-plpython3: before 15.5-1
postgresql-plperl: before 15.5-1
postgresql-docs: before 15.5-1
postgresql-contrib: before 15.5-1
postgresql: before 15.5-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0845
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82942
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-5869
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in array modification. A remote user can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
postgresql-test-rpm-macros: before 15.5-1
postgresql-upgrade-devel: before 15.5-1
postgresql-upgrade: before 15.5-1
postgresql-test: before 15.5-1
postgresql-static: before 15.5-1
postgresql-server-devel: before 15.5-1
postgresql-server: before 15.5-1
postgresql-private-libs: before 15.5-1
postgresql-private-devel: before 15.5-1
postgresql-pltcl: before 15.5-1
postgresql-plpython3: before 15.5-1
postgresql-plperl: before 15.5-1
postgresql-docs: before 15.5-1
postgresql-contrib: before 15.5-1
postgresql: before 15.5-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0845
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82943
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5870
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to pg_cancel_backend rolse signals background workers, including the logical replication launcher, autovacuum workers and the autovacuum launcher. A remote privileged user can abuse this behavior and perform a denial of service (DoS) attack.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 23
postgresql-test-rpm-macros: before 15.5-1
postgresql-upgrade-devel: before 15.5-1
postgresql-upgrade: before 15.5-1
postgresql-test: before 15.5-1
postgresql-static: before 15.5-1
postgresql-server-devel: before 15.5-1
postgresql-server: before 15.5-1
postgresql-private-libs: before 15.5-1
postgresql-private-devel: before 15.5-1
postgresql-pltcl: before 15.5-1
postgresql-plpython3: before 15.5-1
postgresql-plperl: before 15.5-1
postgresql-docs: before 15.5-1
postgresql-contrib: before 15.5-1
postgresql: before 15.5-1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2023:0845
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.