[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2POSTGRESQL12-2023-001 --- postgresql

ID: oval:org.secpod.oval:def:1701790Date: (C)2023-10-26   (M)2024-02-19
Class: PATCHFamily: unix




postgresql: Client memory disclosure when connecting with Kerberos to modified server This enabled an attacker having database-level CREATE privilege to execute arbitrary code as the bootstrap superuser. Database owners have that right by default, and explicit grants may extend it to other users. While CVE-2016-2193 fixed most interaction between row security and user ID changes, it missed a scenario involving function inlining. This leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy

Platform:
Amazon Linux 2
Product:
postgresql
Reference:
ALAS2POSTGRESQL12-2023-001
CVE-2022-41862
CVE-2023-2454
CVE-2023-2455
CVE    3
CVE-2022-41862
CVE-2023-2455
CVE-2023-2454
CPE    2
cpe:/a:postgresql:postgresql
cpe:/o:amazon:linux:2

© SecPod Technologies