rh-postgresql94-postgresql-9.4.14-2.el7
エラータID: AXSA:2017-2466:03
PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* Privilege escalation flaws were found in the initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine. (CVE-2017-12172, CVE-2017-15097)
Note: This patch drops the script privileges from root to the postgres user. Therefore, we dropped the --new-systemd-unit option for security reasons. Please use the root-only script postgresql-new-systemd-unit.
Asianux would like to thank the PostgreSQL project for reporting CVE-2017-12172. The CVE-2017-15097 issue was discovered by Pedro Barbosa (Asianux) and the PostgreSQL project. Upstream acknowledges Antoine Scemama (Brainloop) as the original reporter of these issues.
CVE-2017-12172
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10,
9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs
under a non-root operating system account, and database superusers
have effective ability to run arbitrary code under that system
account. PostgreSQL provides a script for starting the database server
during system boot. Packages of PostgreSQL for many operating systems
provide their own, packager-authored startup implementations. Several
implementations use a log file name that the database superuser can
replace with a symbolic link. As root, they open(), chmod() and/or
chown() this log file name. This often suffices for the database
superuser to escalate to root privileges when root starts the server.
CVE-2017-15097
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
Update packages.
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.
N/A
SRPMS
- rh-postgresql94-postgresql-9.4.14-2.el7.src.rpm
MD5: afb3f1a0083e68612deac9fe49bcf2d0
SHA-256: 554218116bdcb70184aa0a562a443413e755ad3aafc68818fc12f0e43cc6517f
Size: 24.47 MB
Asianux Server 7 for x86_64
- rh-postgresql94-postgresql-9.4.14-2.el7.x86_64.rpm
MD5: d42577df3c27d7bf2bcc0fc5a949a9a8
SHA-256: 7b8218e0fd6601fe4da5ab73e5a22a689ff3867841edbc4ecf3b7a544fccef9b
Size: 3.08 MB - rh-postgresql94-postgresql-contrib-9.4.14-2.el7.x86_64.rpm
MD5: 9bfa541543d77ebf397b5c3041560876
SHA-256: d2507a247d4a21bf4a5d6f7ced299d5663c533d94d5ce2798b30fb699d824121
Size: 605.47 kB - rh-postgresql94-postgresql-devel-9.4.14-2.el7.x86_64.rpm
MD5: 4dda1a8a485867a53d0be51abee784f5
SHA-256: 3f95cd677a342f7a3c5bb6203bab21907e8b80f3cec3dbe8d8aa4bf37294f2aa
Size: 1.00 MB - rh-postgresql94-postgresql-docs-9.4.14-2.el7.x86_64.rpm
MD5: 614f01fa2304f4c7d4386081507d4ac2
SHA-256: 05db618121eb11f8e2aab4bfcf4e57e84dcfe8ccec8303f68e23e4509824dec4
Size: 9.77 MB - rh-postgresql94-postgresql-libs-9.4.14-2.el7.x86_64.rpm
MD5: 63c810366c9bee20e6496ed3621e88d7
SHA-256: a0bc9428d86326a152dbd3abd0a47b919b5ff679c3d628cdf8c64d53b7637cc5
Size: 237.53 kB - rh-postgresql94-postgresql-plperl-9.4.14-2.el7.x86_64.rpm
MD5: f4d79bb29c6162dad84d2c49ae6442ce
SHA-256: bc2fbee8e1197951cd60966e9057e5730c94b5435d24b063d3ab1f80f8254e8f
Size: 83.35 kB - rh-postgresql94-postgresql-plpython-9.4.14-2.el7.x86_64.rpm
MD5: 773afe56e0ef1a1974899df98bff2c91
SHA-256: 6f3652f72178d85fe8b8f63b69b3dfe98d45377084292a0e0c3567430b76e532
Size: 96.40 kB - rh-postgresql94-postgresql-pltcl-9.4.14-2.el7.x86_64.rpm
MD5: 7f8809918415dffe29f2a69cea740f1f
SHA-256: bffadaaf55b79ceb67ffd418b5e95ea98a2f5bd596148eb3cd57c9a7af1bff65
Size: 60.62 kB - rh-postgresql94-postgresql-server-9.4.14-2.el7.x86_64.rpm
MD5: 5a3a2e5c955ed6572443d1c38175163b
SHA-256: 80c4cae331b02ee0d86fdd9365cab3f6ba35e90e19e6e1eb5a2888fded563ae2
Size: 4.04 MB - rh-postgresql94-postgresql-test-9.4.14-2.el7.x86_64.rpm
MD5: a6e954661a49500e8b7b1314661c5c2a
SHA-256: be00f92ac595db3ab3a62320d118a829ea55041fa4fbd16e913ffe93be6d0d19
Size: 1.94 MB - rh-postgresql94-postgresql-upgrade-9.4.14-2.el7.x86_64.rpm
MD5: ed6eb1b6a21f7223914558c0ebab85e1
SHA-256: c0f25d230db412ab7266b8f2289a08f4d8fd2239c6aee6fd6b1e9126f5026469
Size: 84.46 kB