A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:7785 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2023:7883 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2023:7884 | vendor advisory third party advisory |
https://access.redhat.com/errata/RHSA-2023:7885 | vendor advisory third party advisory |
https://access.redhat.com/security/cve/CVE-2023-39418 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2228112 | issue tracking patch third party advisory |
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cb2ae5741f2458a474ed3c31458d242e678ff229 | mailing list patch |
https://www.postgresql.org/support/security/CVE-2023-39418/ | vendor advisory |
https://security.netapp.com/advisory/ntap-20230915-0002/ | |
https://www.debian.org/security/2023/dsa-5553 |