Skip to content

Commit

Permalink
Merge pull request #4657 from EnterpriseDB/release/2023-08-21a
Browse files Browse the repository at this point in the history
Release: 2023-08-21a
  • Loading branch information
drothery-edb authored Aug 21, 2023
2 parents adc550c + e4cc73b commit 59e9b6d
Show file tree
Hide file tree
Showing 10 changed files with 55 additions and 55 deletions.
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx1.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 contain packages, standalone packages and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 contain packages, standalone packages and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -38,7 +38,7 @@ EnterpriseDB Postgres Advanced Server (EPAS)
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx2.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 contain the function _dbms_aq_move_to_exception_queue which may be used to elevate a user’s privileges to superuser. This function accepts the OID of a table, then accesses that table as the superuser using SELECT and DML commands.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 contain the function _dbms_aq_move_to_exception_queue which may be used to elevate a user’s privileges to superuser. This function accepts the OID of a table, then accesses that table as the superuser using SELECT and DML commands.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -38,7 +38,7 @@ EnterpriseDB Postgres Advanced Server (EPAS)
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx3.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 allow an authenticated user to to obtain information about whether certain files exist on disk, what errors if any occur when attempting to read them, and some limited information about their contents regardless of permissions. This can occur when a superuser has configured one or more directories for filesystem access via CREATE DIRECTORY and adopted certain non-default settings for log_line_prefix and log_connections.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 allow an authenticated user to to obtain information about whether certain files exist on disk, what errors if any occur when attempting to read them, and some limited information about their contents regardless of permissions. This can occur when a superuser has configured one or more directories for filesystem access via CREATE DIRECTORY and adopted certain non-default settings for log_line_prefix and log_connections.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -40,7 +40,7 @@ Impacted users must upgrade to a fixed version of EPAS and then patch existing d
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx4.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 may allow an authenticated user to bypass authorization requirements and access underlying implementation functions. When a superuser has configured file locations using CREATE DIRECTORY, these functions allow users to take a wide range of actions, including read, write, copy, rename, and delete.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 may allow an authenticated user to bypass authorization requirements and access underlying implementation functions. When a superuser has configured file locations using CREATE DIRECTORY, these functions allow users to take a wide range of actions, including read, write, copy, rename, and delete.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -40,7 +40,7 @@ Impacted users must upgrade to a fixed version of EPAS and then patch existing d
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
4 changes: 2 additions & 2 deletions advocacy_docs/security/advisories/cve2023xxxxx5.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) up to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 using DBMS_MVIEW allows an authenticated user to refresh any materialized view, regardless of that user’s permissions.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) up to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 using DBMS_MVIEW allows an authenticated user to refresh any materialized view, regardless of that user’s permissions.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx6.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) up to 10.XX, 11.XX, 12.XX, 13.XX, 14.XX and 15.XX contain the functions get_url_as_text and get_url_as_bytea. These functions are publicly executable, thus permitting an authenticated user to read any file from the local filesystem or remote system regardless of that user's permissions.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 contain the functions get_url_as_text and get_url_as_bytea. These functions are publicly executable, thus permitting an authenticated user to read any file from the local filesystem or remote system regardless of that user's permissions.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -38,7 +38,7 @@ EnterpriseDB Postgres Advanced Server (EPAS)
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx7.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0, using UTL_ENCODE allows an authenticated user to read any large object, regardless of that users permissions.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0, using UTL_ENCODE allows an authenticated user to read any large object, regardless of that users permissions.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -40,7 +40,7 @@ Impacted users must upgrade to a fixed version of EPAS and then patch existing d
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
6 changes: 3 additions & 3 deletions advocacy_docs/security/advisories/cve2023xxxxx8.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Last Updated: 2023/08/21

## Summary

All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.16, 14.9.0 and 15.4.0 permit an authenticated user to use DBMS_PROFILER to remove all accumulated profiling data on a system-wide basis, regardless of that user’s permissions.
All versions of EnterpriseDB Postgres Advanced Server (EPAS) prior to 11.21.32, 12.16.20, 13.12.17, 14.9.0 and 15.4.0 permit an authenticated user to use DBMS_PROFILER to remove all accumulated profiling data on a system-wide basis, regardless of that user’s permissions.

## Vulnerability details

Expand All @@ -28,7 +28,7 @@ CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
EnterpriseDB Postgres Advanced Server (EPAS)
* All versions prior to 11.21.32
* All versions prior to 12.16.20
* All versions prior to 13.12.16
* All versions prior to 13.12.17
* All versions prior to 14.9.0
* All versions prior to 15.4.0

Expand All @@ -40,7 +40,7 @@ Impacted users must upgrade to a fixed version of EPAS and then patch existing d
|---------|------|-----------------------|
| EPAS | All versions prior to 11.21.32 | Update to latest supported version <br/> (at least [11.21.32](/epas/11/epas_rel_notes/epas11_21_32_rel_notes/))
| EPAS | All versions prior to 12.16.20 | Update to latest supported version <br/> (at least [12.16.20](/epas/12/epas_rel_notes/epas12_16_20_rel_notes/)) |
| EPAS | All versions prior to 13.12.16 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 13.12.17 | Update to latest supported version <br/> (at least [13.12.17](/epas/13/epas_rel_notes/epas13_12_17_rel_notes/))
| EPAS | All versions prior to 14.9.0 | Update to latest supported version <br/> (at least [14.9.0](/epas/14/epas_rel_notes/epas14_9_0_rel_notes/))
| EPAS | All versions prior to 15.4.0 | Update to latest supported version <br/> (at least [15.4.0](/epas/15/epas_rel_notes/epas15_4_0_rel_notes/))

Expand Down
Loading

1 comment on commit 59e9b6d

@github-actions
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please sign in to comment.