rh-postgresql95-postgresql-9.5.14-1.el7
エラータID: AXSA:2018-3311:01
PostgreSQL is an advanced object-relational database management system (DBMS).
The following packages have been upgraded to a later upstream version: rh-postgresql95-postgresql (9.5.14). (BZ#1612671)
Security Fix(es):
* postgresql: Certain host connection parameters defeat client-side security defenses (CVE-2018-10915)
* postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements (CVE-2018-10925)
* postgresql: Memory disclosure in JSON functions (CVE-2017-15098)
* postgresql: pg_upgrade creates file of sensitive metadata under prevailing umask (CVE-2018-1053)
* postgresql: Uncontrolled search path element in pg_dump and other client applications (CVE-2018-1058)
* postgresql: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges (CVE-2017-15099)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Asianux would like to thank the PostgreSQL project for reporting CVE-2018-10915, CVE-2018-10925, CVE-2017-15098, CVE-2018-1053, and CVE-2017-15099. Upstream acknowledges Andrew Krasichkov as the original reporter of CVE-2018-10915; David Rowley as the original reporter of CVE-2017-15098; Tom Lane as the original reporter of CVE-2018-1053; and Dean Rasheed as the original reporter of CVE-2017-15099.
CVE-2017-15098
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
CVE-2017-15099
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
CVE-2018-1053
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
CVE-2018-1058
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
CVE-2018-10925
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Update packages.
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
N/A
SRPMS
- rh-postgresql95-postgresql-9.5.14-1.el7.src.rpm
MD5: 9daada1d074da6f0c6887d32077e3072
SHA-256: 711412b40505c25417a39f848fe4f0213b07d826cdc0c92c20bd42cab23df214
Size: 25.89 MB
Asianux Server 7 for x86_64
- rh-postgresql95-postgresql-9.5.14-1.el7.x86_64.rpm
MD5: 893237c4a7b537d9af86afaa24e74208
SHA-256: ae761797d290babbd48791c8e1df1ed8704bd73a72dadd2efed3ecba83aca286
Size: 3.34 MB - rh-postgresql95-postgresql-contrib-9.5.14-1.el7.x86_64.rpm
MD5: 80443bf822e8e9047a40b892186e1fb0
SHA-256: cf29b96854ca06363d2410db07e45f4245eeb1dae527981234e919539814af27
Size: 640.32 kB - rh-postgresql95-postgresql-devel-9.5.14-1.el7.x86_64.rpm
MD5: 5c6df45d3587132dcc69ad246ec90e2a
SHA-256: 7c44898ecd78c23c2272811392f366cca501e1461ebda546197cbc758d9661a4
Size: 1.10 MB - rh-postgresql95-postgresql-docs-9.5.14-1.el7.x86_64.rpm
MD5: dcf36a39f18cb693d4150128b0e08cac
SHA-256: 522b21578b781b0b49aba2f43a9c7482e8ec0776a4aa69dbdd9d43f3f753f75b
Size: 10.39 MB - rh-postgresql95-postgresql-libs-9.5.14-1.el7.x86_64.rpm
MD5: 482e733b98a49cced0a2b563df045086
SHA-256: b3f570e37a99ddb8ed3ddb438d9fccc14d1bb1eea0ec7f1aa40f8e970b8fd1c2
Size: 247.63 kB - rh-postgresql95-postgresql-plperl-9.5.14-1.el7.x86_64.rpm
MD5: de85cb6746756e2b4a67868fb0818a31
SHA-256: ed95afd1148757a3c970cae22e5467874c3615f949d4db13b89d588878dfabe3
Size: 87.64 kB - rh-postgresql95-postgresql-plpython-9.5.14-1.el7.x86_64.rpm
MD5: 9d13e008aeb815becd3bca5380b6c835
SHA-256: e383114e80f3046dfd9a0e7f1c7e84fcbc7863153d3e43ac502c9b31ed31ca32
Size: 100.38 kB - rh-postgresql95-postgresql-pltcl-9.5.14-1.el7.x86_64.rpm
MD5: 697029bc8794e0824e8843124625479a
SHA-256: 7df2b47fd4107b5998d6b0402361514824a4c19067ed221c66a49bf2b2e06735
Size: 64.64 kB - rh-postgresql95-postgresql-server-9.5.14-1.el7.x86_64.rpm
MD5: 90ede53e5fac51d7cc2efd74655afbd3
SHA-256: d46b812ec7cf3ecc4e5666a10a5f96f55dcfa63513c60f74c217886409aa42d2
Size: 4.37 MB - rh-postgresql95-postgresql-static-9.5.14-1.el7.x86_64.rpm
MD5: 157dab3e449b2747ce1d59e9af46090c
SHA-256: 2305e4bcfce223b7065de30b3d3fe459338436ecfe968b7c6a713277a31f8967
Size: 131.47 kB - rh-postgresql95-postgresql-test-9.5.14-1.el7.x86_64.rpm
MD5: 0aa0d6000dd88e56b86a99ebdbf3eb02
SHA-256: 78d352aab7a13add0aec0af3cf04aa323686e05252d0005914e4bc3a700d5de9
Size: 1.46 MB