{"affected":[{"ecosystem_specific":{"binaries":[{"libecpg6":"12.15-150100.3.41.1","libpq5":"12.15-150100.3.41.1","libpq5-32bit":"12.15-150100.3.41.1","postgresql12":"12.15-150100.3.41.1","postgresql12-contrib":"12.15-150100.3.41.1","postgresql12-devel":"12.15-150100.3.41.1","postgresql12-docs":"12.15-150100.3.41.1","postgresql12-plperl":"12.15-150100.3.41.1","postgresql12-plpython":"12.15-150100.3.41.1","postgresql12-pltcl":"12.15-150100.3.41.1","postgresql12-server":"12.15-150100.3.41.1","postgresql12-server-devel":"12.15-150100.3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","name":"postgresql12","purl":"pkg:rpm/suse/postgresql12&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.15-150100.3.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libecpg6":"12.15-150100.3.41.1","libpq5":"12.15-150100.3.41.1","libpq5-32bit":"12.15-150100.3.41.1","postgresql12":"12.15-150100.3.41.1","postgresql12-contrib":"12.15-150100.3.41.1","postgresql12-devel":"12.15-150100.3.41.1","postgresql12-docs":"12.15-150100.3.41.1","postgresql12-plperl":"12.15-150100.3.41.1","postgresql12-plpython":"12.15-150100.3.41.1","postgresql12-pltcl":"12.15-150100.3.41.1","postgresql12-server":"12.15-150100.3.41.1","postgresql12-server-devel":"12.15-150100.3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","name":"postgresql12","purl":"pkg:rpm/suse/postgresql12&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.15-150100.3.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libecpg6":"12.15-150100.3.41.1","libpq5":"12.15-150100.3.41.1","libpq5-32bit":"12.15-150100.3.41.1","postgresql12":"12.15-150100.3.41.1","postgresql12-contrib":"12.15-150100.3.41.1","postgresql12-devel":"12.15-150100.3.41.1","postgresql12-docs":"12.15-150100.3.41.1","postgresql12-plperl":"12.15-150100.3.41.1","postgresql12-plpython":"12.15-150100.3.41.1","postgresql12-pltcl":"12.15-150100.3.41.1","postgresql12-server":"12.15-150100.3.41.1","postgresql12-server-devel":"12.15-150100.3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","name":"postgresql12","purl":"pkg:rpm/suse/postgresql12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.15-150100.3.41.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql12 fixes the following issues:\n\nUpdated to version 12.15:\n  - CVE-2023-2454: Fixed an issue where a user having permission to\n    create a schema could hijack the privileges of a security definer\n    function or extension script (bsc#1211228).\n  - CVE-2023-2455: Fixed an issue that could allow a user to see or\n    modify rows that should have been invisible (bsc#1211229).\n  - Internal fixes (bsc#1210303).\n","id":"SUSE-SU-2023:2198-1","modified":"2023-05-15T10:12:13Z","published":"2023-05-15T10:12:13Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20232198-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211228"},{"type":"REPORT","url":"https://bugzilla.suse.com/1211229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2454"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-2455"}],"related":["CVE-2023-2454","CVE-2023-2455"],"summary":"Security update for postgresql12","upstream":["CVE-2023-2454","CVE-2023-2455"]}