Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2023.0324
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2023-0324)
Zusammenfassung:The remote host is missing an update for the 'postgresql11, postgresql13, postgresql15' package(s) announced via the MGASA-2023-0324 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'postgresql11, postgresql13, postgresql15' package(s) announced via the MGASA-2023-0324 advisory.

Vulnerability Insight:
The updated packages fix security vulnerabilities:

Memory disclosure in aggregate function calls. (CVE-2023-5868)

Buffer overrun from integer overflow in array modification.
(CVE-2023-5869)

Role pg_signal_backend can signal certain superuser processes.
(CVE-2023-5870)

Affected Software/OS:
'postgresql11, postgresql13, postgresql15' package(s) on Mageia 8, Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-5868
RHBZ#2247168
https://bugzilla.redhat.com/show_bug.cgi?id=2247168
RHSA-2023:7545
https://access.redhat.com/errata/RHSA-2023:7545
RHSA-2023:7579
https://access.redhat.com/errata/RHSA-2023:7579
RHSA-2023:7580
https://access.redhat.com/errata/RHSA-2023:7580
RHSA-2023:7581
https://access.redhat.com/errata/RHSA-2023:7581
RHSA-2023:7616
https://access.redhat.com/errata/RHSA-2023:7616
RHSA-2023:7656
https://access.redhat.com/errata/RHSA-2023:7656
RHSA-2023:7666
https://access.redhat.com/errata/RHSA-2023:7666
RHSA-2023:7667
https://access.redhat.com/errata/RHSA-2023:7667
RHSA-2023:7694
https://access.redhat.com/errata/RHSA-2023:7694
RHSA-2023:7695
https://access.redhat.com/errata/RHSA-2023:7695
RHSA-2023:7714
https://access.redhat.com/errata/RHSA-2023:7714
RHSA-2023:7770
https://access.redhat.com/errata/RHSA-2023:7770
RHSA-2023:7772
https://access.redhat.com/errata/RHSA-2023:7772
RHSA-2023:7784
https://access.redhat.com/errata/RHSA-2023:7784
RHSA-2023:7785
https://access.redhat.com/errata/RHSA-2023:7785
RHSA-2023:7883
https://access.redhat.com/errata/RHSA-2023:7883
RHSA-2023:7884
https://access.redhat.com/errata/RHSA-2023:7884
RHSA-2023:7885
https://access.redhat.com/errata/RHSA-2023:7885
RHSA-2024:0304
https://access.redhat.com/errata/RHSA-2024:0304
RHSA-2024:0332
https://access.redhat.com/errata/RHSA-2024:0332
RHSA-2024:0337
https://access.redhat.com/errata/RHSA-2024:0337
https://access.redhat.com/security/cve/CVE-2023-5868
https://security.netapp.com/advisory/ntap-20240119-0003/
https://www.postgresql.org/about/news/postgresql-161-155-1410-1313-1217-and-1122-released-2749/
https://www.postgresql.org/support/security/CVE-2023-5868/
Common Vulnerability Exposure (CVE) ID: CVE-2023-5869
RHBZ#2247169
https://bugzilla.redhat.com/show_bug.cgi?id=2247169
RHSA-2023:7771
https://access.redhat.com/errata/RHSA-2023:7771
RHSA-2023:7778
https://access.redhat.com/errata/RHSA-2023:7778
RHSA-2023:7783
https://access.redhat.com/errata/RHSA-2023:7783
RHSA-2023:7786
https://access.redhat.com/errata/RHSA-2023:7786
RHSA-2023:7788
https://access.redhat.com/errata/RHSA-2023:7788
RHSA-2023:7789
https://access.redhat.com/errata/RHSA-2023:7789
RHSA-2023:7790
https://access.redhat.com/errata/RHSA-2023:7790
RHSA-2023:7878
https://access.redhat.com/errata/RHSA-2023:7878
https://access.redhat.com/security/cve/CVE-2023-5869
https://www.postgresql.org/support/security/CVE-2023-5869/
Common Vulnerability Exposure (CVE) ID: CVE-2023-5870
RHBZ#2247170
https://bugzilla.redhat.com/show_bug.cgi?id=2247170
https://access.redhat.com/security/cve/CVE-2023-5870
https://www.postgresql.org/support/security/CVE-2023-5870/
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.