First published: Fri May 12 2023(Updated: )
CVE-2023-2455: Row security policies disregard user ID changes after inlining. Versions Affected: 11 - 15. This problem is quite old. While <a href="https://access.redhat.com/security/cve/CVE-2016-2193">CVE-2016-2193</a> fixed most interaction between row security and user ID changes, it missed a scenario involving function inlining. This leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. <a href="https://www.postgresql.org/support/security/CVE-2023-2455/">https://www.postgresql.org/support/security/CVE-2023-2455/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/PostgreSQL | <15.3 | 15.3 |
redhat/PostgreSQL | <14.8 | 14.8 |
redhat/PostgreSQL | <13.11 | 13.11 |
redhat/PostgreSQL | <12.15 | 12.15 |
redhat/PostgreSQL | <11.20 | 11.20 |
PostgreSQL PostgreSQL | >=11.0<11.20 | |
PostgreSQL PostgreSQL | >=12.0<12.15 | |
PostgreSQL PostgreSQL | >=13.0<13.11 | |
PostgreSQL PostgreSQL | >=14.0<14.8 | |
PostgreSQL PostgreSQL | >=15.0<15.3 | |
Redhat Software Collections | ||
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 | |
ubuntu/postgresql-10 | <10.23-0ubuntu0.18.04.2 | 10.23-0ubuntu0.18.04.2 |
ubuntu/postgresql-12 | <12.15-0ubuntu0.20.04.1 | 12.15-0ubuntu0.20.04.1 |
ubuntu/postgresql-14 | <14.8-0ubuntu0.22.04.1 | 14.8-0ubuntu0.22.04.1 |
ubuntu/postgresql-14 | <14.8-0ubuntu0.22.10.1 | 14.8-0ubuntu0.22.10.1 |
ubuntu/postgresql-15 | <15.3-0ubuntu0.23.04.1 | 15.3-0ubuntu0.23.04.1 |
debian/postgresql-11 | <=11.16-0+deb10u1 | 11.22-0+deb10u2 |
debian/postgresql-13 | 13.13-0+deb11u1 13.14-0+deb11u1 | |
debian/postgresql-15 | 15.5-0+deb12u1 15.6-0+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2455 is medium (5.4).
The affected software for CVE-2023-2455 includes PostgreSQL versions 10.23-0ubuntu0.18.04.2, 12.15-0ubuntu0.20.04.1, 14.8-0ubuntu0.22.04.1, 14.8-0ubuntu0.22.10.1, 15.3-0ubuntu0.23.04.1, Debian versions 11.21-0+deb10u2, 13.11-0+deb11u1, 15.3-0+deb12u1, 15.4-3, Redhat versions 15.3, 14.8, 13.11, 12.15, and 11.20, and Redhat Enterprise Linux versions 8.0 and 9.0.
CVE-2023-2455 is a vulnerability where row security policies in PostgreSQL disregard user ID changes after inlining, potentially allowing incorrect policies to be applied.
To fix CVE-2023-2455, users should update to the latest version of PostgreSQL, as provided in the affected software list.
More information about CVE-2023-2455 can be found at the following references: [1] [2] [3].