postgresql:15 security update

エラータID: AXSA:2024-9499:01

Release date: 
Wednesday, December 25, 2024 - 17:37
Subject: 
postgresql:15 security update
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

* postgresql: PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong
user ID (CVE-2024-10978)
* postgresql: PostgreSQL PL/Perl environment variable changes execute
arbitrary code (CVE-2024-10979)
* postgresql: PostgreSQL row security below e.g. subqueries disregards user ID
changes (CVE-2024-10976)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

CVE-2024-10976
Incomplete tracking in PostgreSQL of tables with row security allows a reused
query to view or change different rows from those intended. CVE-2023-2455 and
CVE-2016-2193 fixed most interaction between row security and user ID changes.
They missed cases where a subquery, WITH query, security invoker view, or
SQL-language function references a table with a row-level security policy. This
has the same consequences as the two earlier CVEs. That is to say, it leads to
potentially incorrect policies being applied in cases where role-specific
policies are used and a given query is planned under one role and then executed
under other roles. This scenario can happen under security definer functions or
when a common user and query is planned initially and then re-used across
multiple SET ROLEs. Applying an incorrect policy may permit a user to complete
otherwise-forbidden reads and modifications. This affects only databases that
have used CREATE POLICY to define a row security policy. An attacker must tailor
an attack to a particular application's pattern of query plan reuse, user ID
changes, and role-specific row security policies. Versions before PostgreSQL
17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10978
Incorrect privilege assignment in PostgreSQL allows a less-privileged
application user to view or change different rows from those intended. An attack
requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an
equivalent feature. The problem arises when an application query uses parameters
from the attacker or conveys query results to the attacker. If that query reacts
to current_setting('role') or the current user ID, it may modify or return data
as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The
attacker does not control which incorrect user ID applies. Query text from
less-privileged sources is not a concern here, because SET ROLE and SET SESSION
AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL
17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an
unprivileged database user to change sensitive process environment variables
(e.g. PATH). That often suffices to enable arbitrary code execution, even if the
attacker lacks a database server operating system user. Versions before
PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.

Modularity name: "postgresql"
Stream name: "15"

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. pgaudit-1.7.0-1.module+el9+1060+6f0ae398.src.rpm
    MD5: 19faeee57ddcbed0f9fc597df0a26a32
    SHA-256: 0bdc87cb61a47267f977673a4a52c78080b8fdd8aa184e8325954080a216b6a6
    Size: 51.24 kB
  2. pg_repack-1.4.8-2.module+el9+1060+6f0ae398.src.rpm
    MD5: 3cec9da88f2dec85a2a35b7622b2f6be
    SHA-256: 025755484f49dcb63454165beabea3a3bb94c0d4da6fbb294a51ebf91c7af089
    Size: 102.34 kB
  3. postgres-decoderbufs-1.9.7-1.Final.module+el9+1060+6f0ae398.src.rpm
    MD5: c75e397125113d2ebcace62bd2a20420
    SHA-256: 10537b88cf34bbe179497c4a2e9dc76f8fbbd493be06be36062c083707625244
    Size: 21.45 kB
  4. postgresql-15.10-1.module+el9+1060+6f0ae398.src.rpm
    MD5: d22616723670886c1c1c70895307cb49
    SHA-256: ca8c6a9d35074bf9efbd59fe8104d1ffb71a9447b48e06955a58d23a5142a985
    Size: 50.87 MB

Asianux Server 9 for x86_64
  1. pgaudit-1.7.0-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 82df491fdbd0e1754d330e7274652497
    SHA-256: c4aaabb4c915abeadf8a57a2ee32eb6e7eb5a6802f22118650176f0c2ab0e3d8
    Size: 27.60 kB
  2. pgaudit-debugsource-1.7.0-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 7ed30eed54ae1477aa8406f0ee5ab145
    SHA-256: 648eb8c93505a1acb59c13a56f460e6adfd55dc280ebc450ed61e1a4c875259d
    Size: 22.29 kB
  3. pg_repack-1.4.8-2.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: ea68b752738be6c8d752f24f07e57f29
    SHA-256: 7ab7307dbff3cac35b390e6657520daca3cc101b378aa68600386cc727d87df5
    Size: 90.45 kB
  4. pg_repack-debugsource-1.4.8-2.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: ed63be563348c11083daf9cd8d19f967
    SHA-256: 53c8e567cacd4b46b1704950900876dd8628727d5702986e195bef841ea673ff
    Size: 48.09 kB
  5. postgres-decoderbufs-1.9.7-1.Final.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 9892b8ef6e52abc9cb8da84bb5c43d8b
    SHA-256: 1f4409b697ec2e954c980597840f702a188e4c113c82764ccfca18f6a8987205
    Size: 22.86 kB
  6. postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 206fb1b13736b49eca641c1e7ff827e9
    SHA-256: 1d8b612fc6383c175366e749925efd5434f3667befc82bcdff1c19ad439e549f
    Size: 16.55 kB
  7. postgresql-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 0608002e1ec0c628b2e7f50d93aaef73
    SHA-256: fa8f5f58bb8d614050a2a6a427e23f5b4b12868e52913f409ec422966a1324c0
    Size: 1.71 MB
  8. postgresql-contrib-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 1c208b1e5172bae438162f45d04b1cb9
    SHA-256: 7b894db9c3d9025c961731d522fd962796ca28e35b247b212c030d49364f9ea8
    Size: 0.98 MB
  9. postgresql-debugsource-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: e8db2d0b4e0c0a8068dd60f80fd601df
    SHA-256: 48ecded3cc45aa4163cc03c7d0e313fbfffa209778fd9d102997c39d97cebff3
    Size: 16.15 MB
  10. postgresql-docs-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: a21b8b75416db7851f2939151497df13
    SHA-256: be4c0e68141f9833fa802e752a7f61b0fed2453ce8355d13ef957cec99eb55c1
    Size: 9.99 MB
  11. postgresql-plperl-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: cf554e410e7075ada03d6dacf692d9b1
    SHA-256: a7e97435f887f821580bb7b07813db4b30437c51281a6f98980938a2dda45546
    Size: 78.25 kB
  12. postgresql-plpython3-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 8628057f977c8c0e34ba54932da7a861
    SHA-256: af31850f1877f21737c0e751008b3a9d39c5a81ec491d4d49e32aa4b513c35e5
    Size: 100.46 kB
  13. postgresql-pltcl-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 8a8f8eaea8eabc80f1f8833a255295d7
    SHA-256: 767f132713b80a30fd36e7ff9ce2d3bb2881e5fc8dc710bb446ff54679a90136
    Size: 52.06 kB
  14. postgresql-private-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: e25b62ae6c6ba258400b73b3915287f8
    SHA-256: b5b73ff934d4b537065050f339dea53402a2af61cdf1f84bc0df7a422acee8d0
    Size: 66.90 kB
  15. postgresql-private-libs-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: e3b44fd1a2d58115ffba961a47b7b170
    SHA-256: dec514209157d46c17912a66dbb36f67397db521c8636fe7902f61fdffa414a2
    Size: 143.41 kB
  16. postgresql-server-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: d41f712a86b05c55775e465dfb5ae7e0
    SHA-256: 9d0142952b134609cc3be59a9f49f57f9887aae26e8b5b2330e220d3193c43aa
    Size: 6.31 MB
  17. postgresql-server-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 6dfd1465ba25d470dc203cb3daca1592
    SHA-256: ff7e816681c5ad48b9070f33616cbfbb24ceb8e0853684de6dac71bc829c0a5c
    Size: 1.45 MB
  18. postgresql-static-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: aa163367218571f77c6d584810c85bea
    SHA-256: 7b63abe208862b6449b508ec461fbfbb4e9265d17a90f85767679cd63365e9c2
    Size: 129.20 kB
  19. postgresql-test-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: ed9b3b1f3c567b4f84f825813159757a
    SHA-256: 520440190fb06258d0bbc175ac57432cd673194e119b177cdd4a3e87ae1d1889
    Size: 1.70 MB
  20. postgresql-test-rpm-macros-15.10-1.module+el9+1060+6f0ae398.noarch.rpm
    MD5: dbe51c8725c4b8ec82447c9028e436ae
    SHA-256: 7d50cf25b41848f5cb5fe052d90bf81117fd55c20f85c05317355291be910c65
    Size: 9.75 kB
  21. postgresql-upgrade-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 8b5c3c4ea8c9da2f12c0ff9c309486e4
    SHA-256: 0b7bdfb3d5a1c34dfa6863c002dd4d82f90b15cc0d112351b232274bd2fabd18
    Size: 4.78 MB
  22. postgresql-upgrade-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
    MD5: 98e2855b042d224f0934fb04508dbf3d
    SHA-256: a49872ec1f107cb8dc7e03fab7f05091d85f75fae2edd7409be4a44c7bbdb3b0
    Size: 1.24 MB