CVE-2023-39417

NameCVE-2023-39417
DescriptionIN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3600-1, DSA-5553-1, DSA-5554-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postgresql-11 (PTS)buster11.16-0+deb10u1vulnerable
buster (security)11.22-0+deb10u2fixed
postgresql-13 (PTS)bullseye13.13-0+deb11u1fixed
bullseye (security)13.14-0+deb11u1fixed
postgresql-15 (PTS)bookworm15.5-0+deb12u1fixed
bookworm (security)15.6-0+deb12u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postgresql-11sourcebuster11.21-0+deb10u2DLA-3600-1
postgresql-11source(unstable)(unfixed)
postgresql-13sourcebullseye13.13-0+deb11u1DSA-5554-1
postgresql-13source(unstable)(unfixed)
postgresql-15sourcebookworm15.5-0+deb12u1DSA-5553-1
postgresql-15source(unstable)15.4-1

Notes

https://www.postgresql.org/support/security/CVE-2023-39417/
https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=de494ec14f6bd7f2676623a5934723a6c8ba51c2 (REL_15_4)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=b1b585e0fc3dd195bc2e338c80760bede08de5f1 (REL_13_12)
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=919ebb023e74546c6293352556365091c5402366 (REL_11_21)

Search for package or bug name: Reporting problems