CVE-2024-10976
PostgreSQL vulnerability analysis and mitigation

Overview

CVE-2024-10976 is a security vulnerability in PostgreSQL related to incomplete tracking of tables with row security. The vulnerability was discovered and disclosed on November 14, 2024, affecting PostgreSQL versions before 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. This issue is related to previous vulnerabilities (CVE-2023-2455 and CVE-2016-2193) that dealt with row security and user ID changes interactions (PostgreSQL Advisory).

Technical details

The vulnerability stems from cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This leads to potentially incorrect policies being applied when role-specific policies are used and a query is planned under one role but executed under other roles. The CVSS v3.1 scores vary between sources, with NVD rating it as 5.4 (MEDIUM) with vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N, while PostgreSQL rates it as 4.2 (MEDIUM) with vector CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N (NVD).

Impact

The vulnerability can allow a user to complete otherwise-forbidden reads and modifications when incorrect policies are applied. This only affects databases that have used CREATE POLICY to define a row security policy. The scenario can occur under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs (PostgreSQL Advisory).

Mitigation and workarounds

The vulnerability has been fixed in PostgreSQL versions 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. Users should upgrade to these or later versions to mitigate the vulnerability (PostgreSQL Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management