First published: Mon Apr 11 2016(Updated: )
PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PostgreSQL Common | =9.5 | |
PostgreSQL Common | =9.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2193 is considered a high-severity vulnerability due to its potential to bypass access restrictions.
To fix CVE-2016-2193, update PostgreSQL to version 9.5.2 or later.
CVE-2016-2193 affects PostgreSQL versions 9.5 and 9.5.1.
The impact of CVE-2016-2193 allows attackers to execute queries as multiple roles, potentially exposing sensitive data.
CVE-2016-2193 is particularly relevant to deployments using row-level security features in PostgreSQL.