Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 906148 (CVE-2023-2454, CVE-2023-2455) - <dev-db/postgresql-{11.20:11,12.15:12,13.11:13:14.8:14,15.3:15}: multiple vulnerabilities
Summary: <dev-db/postgresql-{11.20:11,12.15:12,13.11:13:14.8:14,15.3:15}: multiple vul...
Status: RESOLVED FIXED
Alias: CVE-2023-2454, CVE-2023-2455
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://www.postgresql.org/about/news...
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 906149
Blocks:
  Show dependency tree
 
Reported: 2023-05-11 14:47 UTC by Patrick Lauer
Modified: 2023-09-17 12:54 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Patrick Lauer gentoo-dev 2023-05-11 14:47:55 UTC
Affected versions: <11.20, <12.15, <13.11, <14.8, <15.3

CVE-2023-2454: CREATE SCHEMA ... schema_element defeats protective search_path changes.

Versions Affected: 11 - 15. The security team typically does not test unsupported versions, but this problem is quite old.

This enabled an attacker having database-level CREATE privilege to execute arbitrary code as the bootstrap superuser. Database owners have that right by default, and explicit grants may extend it to other users.

The PostgreSQL project thanks Alexander Lakhin for reporting this problem.

CVE-2023-2455: Row security policies disregard user ID changes after inlining.

Versions Affected: 11 - 15. The security team typically does not test unsupported versions, but this problem is quite old.

While CVE-2016-2193 fixed most interaction between row security and user ID changes, it missed a scenario involving function inlining. This leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.

The PostgreSQL project thanks Wolfgang Walther for reporting this problem.
Comment 1 Patrick Lauer gentoo-dev 2023-05-11 14:52:55 UTC
Stabilization in #906149
Comment 2 Hans de Graaff gentoo-dev Security 2023-09-03 12:11:41 UTC
GLSA vote: no.