postgresql:15 security update
エラータID: AXSA:2024-9499:01
リリース日:
2024/12/25 Wednesday - 17:37
題名:
postgresql:15 security update
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- PostgreSQL には、クエリを再利用する際における誤った
行のセキュリティポリシーを適用してしまう問題があるため、
リモートの攻撃者により、行単位のセキュリティポリシーを
持つテーブルに対する特定のクエリや SQL 関数の実行を
介して、不正なデータの読み取りや更新を可能とする脆弱性
が存在します。(CVE-2024-10976)
- PostgreSQL には、リモートの攻撃者により、SET ROLE、
SET SESSION AUTHORIZATION、または同等の機能の利用を
介して、意図しない行の表示および更新を可能とする脆弱性
が存在します。(CVE-2024-10978)
- PostgreSQL の PL/Perl には、環境変数の処理の欠陥に
起因して PATH などの環境変数の変更を許容してしまう問題
があるため、権限のないリモートの攻撃者により、任意の
コードの実行を可能とする脆弱性が存在します。
(CVE-2024-10979)
Modularity name: postgresql
Stream name: 15
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2024-10976
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended. CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes. They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy. This has the same consequences as the two earlier CVEs. That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10978
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended. An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature. The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker. If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION. The attacker does not control which incorrect user ID applies. Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
CVE-2024-10979
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
追加情報:
N/A
ダウンロード:
SRPMS
- pgaudit-1.7.0-1.module+el9+1060+6f0ae398.src.rpm
MD5: 19faeee57ddcbed0f9fc597df0a26a32
SHA-256: 0bdc87cb61a47267f977673a4a52c78080b8fdd8aa184e8325954080a216b6a6
Size: 51.24 kB - pg_repack-1.4.8-2.module+el9+1060+6f0ae398.src.rpm
MD5: 3cec9da88f2dec85a2a35b7622b2f6be
SHA-256: 025755484f49dcb63454165beabea3a3bb94c0d4da6fbb294a51ebf91c7af089
Size: 102.34 kB - postgres-decoderbufs-1.9.7-1.Final.module+el9+1060+6f0ae398.src.rpm
MD5: c75e397125113d2ebcace62bd2a20420
SHA-256: 10537b88cf34bbe179497c4a2e9dc76f8fbbd493be06be36062c083707625244
Size: 21.45 kB - postgresql-15.10-1.module+el9+1060+6f0ae398.src.rpm
MD5: d22616723670886c1c1c70895307cb49
SHA-256: ca8c6a9d35074bf9efbd59fe8104d1ffb71a9447b48e06955a58d23a5142a985
Size: 50.87 MB
Asianux Server 9 for x86_64
- pgaudit-1.7.0-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 82df491fdbd0e1754d330e7274652497
SHA-256: c4aaabb4c915abeadf8a57a2ee32eb6e7eb5a6802f22118650176f0c2ab0e3d8
Size: 27.60 kB - pgaudit-debugsource-1.7.0-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 7ed30eed54ae1477aa8406f0ee5ab145
SHA-256: 648eb8c93505a1acb59c13a56f460e6adfd55dc280ebc450ed61e1a4c875259d
Size: 22.29 kB - pg_repack-1.4.8-2.module+el9+1060+6f0ae398.x86_64.rpm
MD5: ea68b752738be6c8d752f24f07e57f29
SHA-256: 7ab7307dbff3cac35b390e6657520daca3cc101b378aa68600386cc727d87df5
Size: 90.45 kB - pg_repack-debugsource-1.4.8-2.module+el9+1060+6f0ae398.x86_64.rpm
MD5: ed63be563348c11083daf9cd8d19f967
SHA-256: 53c8e567cacd4b46b1704950900876dd8628727d5702986e195bef841ea673ff
Size: 48.09 kB - postgres-decoderbufs-1.9.7-1.Final.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 9892b8ef6e52abc9cb8da84bb5c43d8b
SHA-256: 1f4409b697ec2e954c980597840f702a188e4c113c82764ccfca18f6a8987205
Size: 22.86 kB - postgres-decoderbufs-debugsource-1.9.7-1.Final.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 206fb1b13736b49eca641c1e7ff827e9
SHA-256: 1d8b612fc6383c175366e749925efd5434f3667befc82bcdff1c19ad439e549f
Size: 16.55 kB - postgresql-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 0608002e1ec0c628b2e7f50d93aaef73
SHA-256: fa8f5f58bb8d614050a2a6a427e23f5b4b12868e52913f409ec422966a1324c0
Size: 1.71 MB - postgresql-contrib-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 1c208b1e5172bae438162f45d04b1cb9
SHA-256: 7b894db9c3d9025c961731d522fd962796ca28e35b247b212c030d49364f9ea8
Size: 0.98 MB - postgresql-debugsource-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: e8db2d0b4e0c0a8068dd60f80fd601df
SHA-256: 48ecded3cc45aa4163cc03c7d0e313fbfffa209778fd9d102997c39d97cebff3
Size: 16.15 MB - postgresql-docs-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: a21b8b75416db7851f2939151497df13
SHA-256: be4c0e68141f9833fa802e752a7f61b0fed2453ce8355d13ef957cec99eb55c1
Size: 9.99 MB - postgresql-plperl-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: cf554e410e7075ada03d6dacf692d9b1
SHA-256: a7e97435f887f821580bb7b07813db4b30437c51281a6f98980938a2dda45546
Size: 78.25 kB - postgresql-plpython3-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 8628057f977c8c0e34ba54932da7a861
SHA-256: af31850f1877f21737c0e751008b3a9d39c5a81ec491d4d49e32aa4b513c35e5
Size: 100.46 kB - postgresql-pltcl-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 8a8f8eaea8eabc80f1f8833a255295d7
SHA-256: 767f132713b80a30fd36e7ff9ce2d3bb2881e5fc8dc710bb446ff54679a90136
Size: 52.06 kB - postgresql-private-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: e25b62ae6c6ba258400b73b3915287f8
SHA-256: b5b73ff934d4b537065050f339dea53402a2af61cdf1f84bc0df7a422acee8d0
Size: 66.90 kB - postgresql-private-libs-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: e3b44fd1a2d58115ffba961a47b7b170
SHA-256: dec514209157d46c17912a66dbb36f67397db521c8636fe7902f61fdffa414a2
Size: 143.41 kB - postgresql-server-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: d41f712a86b05c55775e465dfb5ae7e0
SHA-256: 9d0142952b134609cc3be59a9f49f57f9887aae26e8b5b2330e220d3193c43aa
Size: 6.31 MB - postgresql-server-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 6dfd1465ba25d470dc203cb3daca1592
SHA-256: ff7e816681c5ad48b9070f33616cbfbb24ceb8e0853684de6dac71bc829c0a5c
Size: 1.45 MB - postgresql-static-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: aa163367218571f77c6d584810c85bea
SHA-256: 7b63abe208862b6449b508ec461fbfbb4e9265d17a90f85767679cd63365e9c2
Size: 129.20 kB - postgresql-test-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: ed9b3b1f3c567b4f84f825813159757a
SHA-256: 520440190fb06258d0bbc175ac57432cd673194e119b177cdd4a3e87ae1d1889
Size: 1.70 MB - postgresql-test-rpm-macros-15.10-1.module+el9+1060+6f0ae398.noarch.rpm
MD5: dbe51c8725c4b8ec82447c9028e436ae
SHA-256: 7d50cf25b41848f5cb5fe052d90bf81117fd55c20f85c05317355291be910c65
Size: 9.75 kB - postgresql-upgrade-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 8b5c3c4ea8c9da2f12c0ff9c309486e4
SHA-256: 0b7bdfb3d5a1c34dfa6863c002dd4d82f90b15cc0d112351b232274bd2fabd18
Size: 4.78 MB - postgresql-upgrade-devel-15.10-1.module+el9+1060+6f0ae398.x86_64.rpm
MD5: 98e2855b042d224f0934fb04508dbf3d
SHA-256: a49872ec1f107cb8dc7e03fab7f05091d85f75fae2edd7409be4a44c7bbdb3b0
Size: 1.24 MB