git: c58dfdc149af - main - security/vuxml: document postgresql-server vulnerabilities

From: Palle Girgensohn <girgen_at_FreeBSD.org>
Date: Thu, 11 May 2023 15:43:39 UTC
The branch main has been updated by girgen:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c58dfdc149af7043cb7edbe9d36bf4a9177b8c77

commit c58dfdc149af7043cb7edbe9d36bf4a9177b8c77
Author:     Palle Girgensohn <girgen@FreeBSD.org>
AuthorDate: 2023-05-11 15:37:42 +0000
Commit:     Palle Girgensohn <girgen@FreeBSD.org>
CommitDate: 2023-05-11 15:42:13 +0000

    security/vuxml: document postgresql-server vulnerabilities
    
    CVE-2023-2454
    CVE-2023-2455
---
 security/vuxml/vuln/2023.xml | 78 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 78 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 99d8615001e1..86a7ea1eac08 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,81 @@
+  <vuln vid="4b636f50-f011-11ed-bbae-6cc21735f730">
+    <topic>postgresql-server -- Row security policies disregard user ID changes after inlining</topic>
+    <affects>
+      <package>
+	<name>postgresql-server</name>
+	<range><lt>15.3</lt></range>
+	<range><lt>14.8</lt></range>
+	<range><lt>13.11</lt></range>
+	<range><lt>12.15</lt></range>
+	<range><lt>11.20</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL Project reports</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2023-2455/">
+	  <p>
+	    While CVE-2016-2193 fixed most interaction between row security and
+	    user ID changes, it missed a scenario involving function
+	    inlining. This leads to potentially incorrect policies being
+	    applied in cases where role-specific policies are used and a
+	    given query is planned under one role and then executed under
+	    other roles. This scenario can happen under security definer
+	    functions or when a common user and query is planned
+	    initially and then re-used across multiple SET ROLEs.
+	    Applying an incorrect policy may permit a user to complete
+	    otherwise-forbidden reads and modifications. This affects
+	    only databases that have used CREATE POLICY to define a row
+	    security policy.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2023-2455</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2023-2455/</url>
+    </references>
+    <dates>
+      <discovery>2023-05-11</discovery>
+      <entry>2023-05-11</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="fbb5a260-f00f-11ed-bbae-6cc21735f730">
+    <topic>postgresql-server -- CREATE SCHEMA ... schema elements defeats protective search_path changes</topic>
+    <affects>
+      <package>
+	<name>postgresql-server</name>
+	<range><lt>15.3</lt></range>
+	<range><lt>14.8</lt></range>
+	<range><lt>13.11</lt></range>
+	<range><lt>12.15</lt></range>
+	<range><lt>11.20</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL Project reports</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2023-2454/">
+	  <p>
+	    This enabled an attacker having database-level CREATE
+	    privilege to execute arbitrary code as the bootstrap
+	    superuser. Database owners have that right by default,
+	    and explicit grants may extend it to other users.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2023-2454</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2023-2454/</url>
+    </references>
+    <dates>
+      <discovery>2023-05-11</discovery>
+      <entry>2023-05-11</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7913fe6d-2c6e-40ba-a7d7-35696f3db2b6">
     <topic>vscode -- Visual Studio Code Information Disclosure Vulnerability</topic>
     <affects>