postgresql:15 security update
エラータID: AXSA:2024-9055:01
リリース日:
2024/12/09 Monday - 20:40
題名:
postgresql:15 security update
影響のあるチャネル:
Asianux Server 8 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- PostgreSQL には、クエリを再利用する際における誤った
行のセキュリティポリシーを適用してしまう問題があるため、
リモートの攻撃者により、行単位のセキュリティポリシーを
持つテーブルに対する特定のクエリや SQL 関数の実行を
介して、不正なデータの読み取りや更新を可能とする脆弱性
が存在します。(CVE-2024-10976)
- PostgreSQL には、リモートの攻撃者により、SET ROLE、
SET SESSION AUTHORIZATION、または同等の機能の利用を
介して、意図しない行の表示および更新を可能とする脆弱性
が存在します。(CVE-2024-10978)
- PostgreSQL の PL/Perl には、環境変数の処理の欠陥に
起因して PATH などの環境変数の変更を許容してしまう問題
があるため、権限のないリモートの攻撃者により、任意の
コードの実行を可能とする脆弱性が存在します。
(CVE-2024-10979)
Modularity name: postgresql
Stream name: 15
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-10976
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10978
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
追加情報:
N/A
ダウンロード:
SRPMS
- pgaudit-1.7.0-1.module+el8+1827+9fc3cd19.src.rpm
MD5: 11df8ed161155d492279c61f0abe4b63
SHA-256: a5e3525c96e18bbb330138e1f3e7f353038f25d6bb34b6aa81c21f70f01aa18b
Size: 52.57 kB - pg_repack-1.4.8-1.module+el8+1827+9fc3cd19.src.rpm
MD5: 3b96400ae4ef21f24c14ecb6cda7a2c1
SHA-256: e0db12a21929fbe8610855959a7a24cd7234be701c7273823c87038476ec9edb
Size: 102.55 kB - postgres-decoderbufs-1.9.7-1.Final.module+el8+1827+9fc3cd19.src.rpm
MD5: 348030046df6dcd947785b8569f40009
SHA-256: 1682dc1f9c0793c59667c405568ac311f6f20e93f209f7d88f3f581132f1958d
Size: 23.30 kB - postgresql-15.10-1.module+el8+1827+9fc3cd19.src.rpm
MD5: 453a385c02733784e45afb94bab6faaf
SHA-256: 6de534e2fa99df9dbf8f22fee8b0b76321abd71bc4d4e7c0c6fd674839c19ea6
Size: 50.87 MB
Asianux Server 8 for x86_64
- pgaudit-1.7.0-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: c6644176383a80c67e5153d7278872db
SHA-256: 8a4d906425e2e48338b4b2c8d5bbe3f026fed47fc9859de8247aaff3bc2e912c
Size: 28.33 kB - pgaudit-debugsource-1.7.0-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 26001908f33078da0f16b4f575ec7d0f
SHA-256: 9630f6423ca81ff2488b9b2740c5cdb928a8d66d4d8f890f56643b9754ba52ed
Size: 24.12 kB - pg_repack-1.4.8-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 7c740826439706ae6426d28c16f819b1
SHA-256: 2aa3406c430d1baadc868f95b36f5323366005fd419b63506404227cc3ec5a52
Size: 94.12 kB - pg_repack-debugsource-1.4.8-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: f336400d68f0a46f69b0ed9c9df30f39
SHA-256: 861ec3532fe8961f63a99b8b2c96378f169f030cd9d25238e7968b97fc3661da
Size: 50.55 kB - postgres-decoderbufs-1.9.7-1.Final.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 0ce8b9a9b79216bb7fe98c4951c11792
SHA-256: 31e0ecd0b6c6b4b1f7b03ccc1f7e391078d5c4a7ca032e3884923f3c26f6fd8c
Size: 23.82 kB - postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 64f2964ce8e8589bcf96ca792f2193ea
SHA-256: 3655b7e583552eccba4ab1839b3417eec5733f7bb14cf74bad6dd6a9ba2fc4ff
Size: 18.27 kB - postgresql-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: e692cee7394485827ca450421b6d5955
SHA-256: aeb6f912d07ece055c605a47b88e867006298b373057aeae8680ed485df2762a
Size: 1.69 MB - postgresql-contrib-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 8755ec4c37eb2ae73a2314d7a769ad97
SHA-256: bb8154ed16b4a64f0b002f99b60e72355fd2d6955f63f228cf55959b60f46961
Size: 960.28 kB - postgresql-debugsource-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 26e631fd644392c307b793bd5f8866a0
SHA-256: 70bfc08ff85f530c912b0baaae226aee09901bba892ca54d2623fd470079a85d
Size: 18.91 MB - postgresql-docs-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 081f65545a3f978202ea21a5724d1744
SHA-256: 242eb2f7a76d431dd208d1910237177338c5590dcc2326ba47efad9b176177b0
Size: 10.26 MB - postgresql-plperl-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 6a19aae63202ca52efdffe21c55cbfa5
SHA-256: 05f235d65c8b4b0d6736a0b5c9633f185c2460611e68571a066d59af1043e8e9
Size: 72.70 kB - postgresql-plpython3-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 1b03dcc69cf8473943a77042d83a8d98
SHA-256: 6ecbdb5be7687cd4ccbb1e3b842970018ce6d218c2b89af011a6dbd9dd66ec95
Size: 92.23 kB - postgresql-pltcl-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 7f1d69f68332204431e9376710dc29a6
SHA-256: a34226669a750c12a6ba3fe519794e293ff4dead9c7c8193006a3bf5b3293786
Size: 45.11 kB - postgresql-private-devel-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: c46491ebff9b4380413694e9af9bbbb5
SHA-256: a4049dfa113a0ae382f319da3ade56cc24d3cf1fbbc1e6e4cddf1d21131ae9ed
Size: 64.04 kB - postgresql-private-libs-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 745eeaf3641df6e22ec64ef09f0b4f24
SHA-256: d109fae5b757b023fbc152b3d4f60a5defa4da766bb8015eb952115c6e3e2cf5
Size: 132.03 kB - postgresql-server-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 118ba63569ffacdfafff28a3e0576f20
SHA-256: 620b381216570e86b926e43d79b76f91dd91598f42abd8556507f09315fefd13
Size: 6.14 MB - postgresql-server-devel-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: cccd076b597ef8dd8071fd53bf08b28f
SHA-256: 8f94c312b2bffb08324d7fbb694caef1fad01d38244a50f143f8a651ca22867f
Size: 1.37 MB - postgresql-static-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: c6f99cba13b23466f814b42ad65a1550
SHA-256: c1bc1fce152aed2d2f502ef02009c031ff41412ed6f70e298089d5fe499f3908
Size: 152.90 kB - postgresql-test-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: c9e2a35f8210e87c3de9693ea9e67e47
SHA-256: 499e7a73ea220bbceaa664ffa42541cce2c1f16fcb07927d772cf563022efdd3
Size: 2.16 MB - postgresql-test-rpm-macros-15.10-1.module+el8+1827+9fc3cd19.noarch.rpm
MD5: 31f220e4c737edd0eff899481cbc3ab5
SHA-256: 076a35d8c2b70bbcaee02e53fb4ffc6573067ed32080462c165f06f8e2d955b4
Size: 9.86 kB - postgresql-upgrade-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: 980333c54a8a94a61937e24eff39f4c6
SHA-256: 43a4347f9ef4591cc49cc49942592db150e6ff97913ba488ad26b7e1ac7e3fbc
Size: 4.50 MB - postgresql-upgrade-devel-15.10-1.module+el8+1827+9fc3cd19.x86_64.rpm
MD5: f00a958aca9aa15f036ba7fbb311ae4b
SHA-256: 0e46db1aa3d355e895698464c55af8e7c4b371a273ede6fb7d4b0536d8ff24e5
Size: 1.18 MB