CVE-2024-10976

Source
https://cve.org/CVERecord?id=CVE-2024-10976
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10976.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-10976
Aliases
Downstream
Related
Published
2024-11-14T13:15:03.793Z
Modified
2026-02-03T04:34:46.413181Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

References

Affected packages

Git / git.postgresql.org/git/postgresql.git

Affected ranges

Type
GIT
Repo
https://git.postgresql.org/git/postgresql.git
Events
Introduced
2a7ce2e2ce474504a707ec03e128fde66cfb8b48
Fixed
0c53d54c812cea0d840490fd107910ed949e18c2
Introduced
ad1f2885b8c82e0c2d56d7974f012cbecce17a17
Fixed
20a82026828536331ebe912b86f060078a173633
Introduced
29be9983a64c011eac0b9ee29895cce71e15ea77
Fixed
64ecc00908b7557afa911c15bb342ff06845bb19
Introduced
86a4dc1e6f29d1992a2afa3fac1a0b0a6e84568c
Fixed
8abd1324049759c1cbd81a4793c470a4f43e1fdb
Introduced
c372fbbd8e911f2412b80a8c39d7079366565d67
Fixed
8c9d34cdc4d213a57fa8b8a7197f7d6f22fca4c9
Introduced
d7ec59a63d745ba74fba0e280bbf85dc6d1caa3e
Fixed
91f20bc2f7e4fcf5de5c65a6cb1190e0afa91c0b

Affected versions

Other
REL_12_0
REL_12_1
REL_12_10
REL_12_11
REL_12_12
REL_12_13
REL_12_14
REL_12_15
REL_12_16
REL_12_17
REL_12_18
REL_12_19
REL_12_2
REL_12_20
REL_12_3
REL_12_4
REL_12_5
REL_12_6
REL_12_7
REL_12_8
REL_12_9
REL_13_0
REL_13_1
REL_13_10
REL_13_11
REL_13_12
REL_13_13
REL_13_14
REL_13_15
REL_13_16
REL_13_2
REL_13_3
REL_13_4
REL_13_5
REL_13_6
REL_13_7
REL_13_8
REL_13_9
REL_14_0
REL_14_1
REL_14_10
REL_14_11
REL_14_12
REL_14_13
REL_14_2
REL_14_3
REL_14_4
REL_14_5
REL_14_6
REL_14_7
REL_14_8
REL_14_9
REL_15_0
REL_15_1
REL_15_2
REL_15_3
REL_15_4
REL_15_5
REL_15_6
REL_15_7
REL_15_8
REL_16_0
REL_16_1
REL_16_2
REL_16_3
REL_16_4
REL_17_0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-10976.json"