rh-postgresql96-postgresql-9.6.10-1.el7
エラータID: AXSA:2018-3310:01
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: rh-postgresql96-postgresql (9.6.10). (BZ#1614340)
Security Fix(es):
* postgresql: Certain host connection parameters defeat client-side security defenses (CVE-2018-10915)
* postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements (CVE-2018-10925)
* postgresql: Memory disclosure in JSON functions (CVE-2017-15098)
* postgresql: pg_upgrade creates file of sensitive metadata under prevailing umask (CVE-2018-1053)
* postgresql: Uncontrolled search path element in pg_dump and other client applications (CVE-2018-1058)
* postgresql: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges (CVE-2017-15099)
* postgresql: Too-permissive access control list on function pg_logfile_rotate() (CVE-2018-1115)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the PostgreSQL project for reporting CVE-2018-10915, CVE-2018-10925, CVE-2017-15098, CVE-2018-1053, CVE-2017-15099, and CVE-2018-1115. Upstream acknowledges Andrew Krasichkov as the original reporter of CVE-2018-10915; David Rowley as the original reporter of CVE-2017-15098; Tom Lane as the original reporter of CVE-2018-1053; Dean Rasheed as the original reporter of CVE-2017-15099; and Stephen Frost as the original reporter of CVE-2018-1115.
CVE-2017-15098
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
CVE-2017-15099
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
CVE-2018-1053
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
CVE-2018-1058
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
CVE-2018-1115
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
CVE-2018-10925
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Update packages.
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
N/A
SRPMS
- rh-postgresql96-postgresql-9.6.10-1.el7.src.rpm
MD5: b0f97db4c69a79fa801d86f9d8035a1c
SHA-256: a3010a89cbfe35ec63b28733f91610e00db4ed1df1e20ddf901da73b3eddcc04
Size: 27.49 MB
Asianux Server 7 for x86_64
- rh-postgresql96-postgresql-9.6.10-1.el7.x86_64.rpm
MD5: 7f029ac7c0a2f05973b01b079e766fd5
SHA-256: 74b3dac76e57027f2ce756a2901ef5a05274720d7150aa63d59ef7110a6e98b2
Size: 1.34 MB - rh-postgresql96-postgresql-contrib-9.6.10-1.el7.x86_64.rpm
MD5: 3616b10372c3ba18d543bff7b3abfaa0
SHA-256: 587cc445cb2d8da35084275940b06ef9e355e3276c15191c567565baa5da782b
Size: 722.75 kB - rh-postgresql96-postgresql-contrib-syspaths-9.6.10-1.el7.x86_64.rpm
MD5: 25056bab5318440577699fe05dc331a0
SHA-256: 6ddc41848632e1397b1a31a6be082b3fc2611de4fe2fa58d64a7b887d34fd33b
Size: 40.09 kB - rh-postgresql96-postgresql-devel-9.6.10-1.el7.x86_64.rpm
MD5: 38a5d770374e5e898989f21ea69673ab
SHA-256: 9220efe994d1192388ab0deeffc42d4fa819f355d231f840f5f17d2b2bbf8a11
Size: 1.19 MB - rh-postgresql96-postgresql-docs-9.6.10-1.el7.x86_64.rpm
MD5: 77bad880c0c859f3cf537e25d81aa324
SHA-256: 51987c46aa033c424bc9e3c464120848ce0f93601f55792bc3793be0a41f28e0
Size: 10.84 MB - rh-postgresql96-postgresql-libs-9.6.10-1.el7.x86_64.rpm
MD5: 5ea13cc9b2ca1dc9309567028a562322
SHA-256: 15359eaa56abd7f55696f234b103a6665a481a63f625b4f4963615dc2bff6e84
Size: 253.30 kB - rh-postgresql96-postgresql-plperl-9.6.10-1.el7.x86_64.rpm
MD5: 8ff923c20518d81f291ccd5217facbac
SHA-256: d4fdf5340126d0c553dca7be325092d6a637746c593f859cc472d0a1fc680940
Size: 89.71 kB - rh-postgresql96-postgresql-plpython-9.6.10-1.el7.x86_64.rpm
MD5: e92aacd970448847b010b7653701751c
SHA-256: ac9b8c2dbd25e2bad57861ea3b1dfd9fdffd1066e541f5b8db0087e4e395d6d9
Size: 107.54 kB - rh-postgresql96-postgresql-pltcl-9.6.10-1.el7.x86_64.rpm
MD5: cab1390ca2c8e4c0827d01e88fd47ce7
SHA-256: 4469554550dfa31a1f08e3985b83c3096b66881b635ee5e5fac30339d280c042
Size: 71.32 kB - rh-postgresql96-postgresql-server-9.6.10-1.el7.x86_64.rpm
MD5: 20ee594c2ff86c18882ec029c6c436ff
SHA-256: 7a8d2a0c47193006d6c67b9850d8118445db68d57f19c8ea90acdebfca239168
Size: 4.82 MB - rh-postgresql96-postgresql-server-syspaths-9.6.10-1.el7.x86_64.rpm
MD5: 735b72b7a7e4fb9087cbcb94a336b48d
SHA-256: b55d9c26a2110282e49d11ffac25f42203c8c0f59fffe6e20a0c06b6bf21a0c2
Size: 41.57 kB - rh-postgresql96-postgresql-static-9.6.10-1.el7.x86_64.rpm
MD5: 88c885db00f7632729f349e31cd4dbaa
SHA-256: 234ec0bfcfcca26d196e5f1523a7c35e6db9cc592a614d8f6b7e8b757cd8cf87
Size: 71.79 kB - rh-postgresql96-postgresql-syspaths-9.6.10-1.el7.x86_64.rpm
MD5: 8f758d89201e8b680a706aa3bc0a37a2
SHA-256: 99af696ad183a1c735f3416b0783523f38a938ccb1a9e743c57f52ceeec03016
Size: 41.99 kB - rh-postgresql96-postgresql-test-9.6.10-1.el7.x86_64.rpm
MD5: 171efa96dc744f95bbb1b6ef449fa910
SHA-256: 0983ec97f554ff81cff945d06a3d638928139f79beee5bd545748fe0a265c96d
Size: 1.52 MB