rh-postgresql95-postgresql-9.5.14-1.AXS4

エラータID: AXSA:2018-3313:01

リリース日: 
2018/09/05 Wednesday - 10:19
題名: 
rh-postgresql95-postgresql-9.5.14-1.AXS4
影響のあるチャネル: 
Asianux Server 4 for x86_64
Severity: 
High
Description: 

PostgreSQL is an advanced object-relational database management system (DBMS).

The following packages have been upgraded to a later upstream version: rh-postgresql95-postgresql (9.5.14). (BZ#1612671)

Security Fix(es):

* postgresql: Certain host connection parameters defeat client-side security defenses (CVE-2018-10915)

* postgresql: Missing authorization and memory disclosure in INSERT ... ON CONFLICT DO UPDATE statements (CVE-2018-10925)

* postgresql: Memory disclosure in JSON functions (CVE-2017-15098)

* postgresql: pg_upgrade creates file of sensitive metadata under prevailing umask (CVE-2018-1053)

* postgresql: Uncontrolled search path element in pg_dump and other client applications (CVE-2018-1058)

* postgresql: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges (CVE-2017-15099)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Asianux would like to thank the PostgreSQL project for reporting CVE-2018-10915, CVE-2018-10925, CVE-2017-15098, CVE-2018-1053, and CVE-2017-15099. Upstream acknowledges Andrew Krasichkov as the original reporter of CVE-2018-10915; David Rowley as the original reporter of CVE-2017-15098; Tom Lane as the original reporter of CVE-2018-1053; and Dean Rasheed as the original reporter of CVE-2017-15099.

CVE-2017-15098
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
CVE-2017-15099
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
CVE-2018-1053
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
CVE-2018-1058
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
CVE-2018-10915
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
CVE-2018-10925
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. rh-postgresql95-postgresql-9.5.14-1.AXS4.src.rpm
    MD5: 9d1ba45acdae6f78b3348b4b1ab3414d
    SHA-256: ef435dd665f2726287641da8759b1fc45db65313ee10ae06256c9591bf4d75c7
    Size: 25.89 MB

Asianux Server 4 for x86_64
  1. rh-postgresql95-postgresql-9.5.14-1.AXS4.x86_64.rpm
    MD5: c5d5f29ba551e32087fb754f2371f193
    SHA-256: c28e81a77a1bb97f7b6026b283ba70615a593a02a457f91cc616397e6a916aec
    Size: 3.48 MB
  2. rh-postgresql95-postgresql-contrib-9.5.14-1.AXS4.x86_64.rpm
    MD5: 1f86d14353644a48ea8b66ead021561a
    SHA-256: df7a8f57221b75962b8825532e95e983a7ce453020c6d7b2471f30456f86612b
    Size: 555.45 kB
  3. rh-postgresql95-postgresql-devel-9.5.14-1.AXS4.x86_64.rpm
    MD5: 8ede606a3d4c68474cd2e99574eb855e
    SHA-256: 8f7191fd5e3843349f42e79063dbe37872ee8c5ae1155b9d35cdcd069572f3c8
    Size: 1.12 MB
  4. rh-postgresql95-postgresql-docs-9.5.14-1.AXS4.x86_64.rpm
    MD5: f349d8c6edfb4b4022f0b9fbcc5f1d62
    SHA-256: 3628649ea699f03af0c735d5fd1c382c120be555fcdf89f6e0b603e146868819
    Size: 10.54 MB
  5. rh-postgresql95-postgresql-libs-9.5.14-1.AXS4.x86_64.rpm
    MD5: 8a0b0fabbeade904e64fb0036e903210
    SHA-256: de044593586e0c1dc36bfeb08e3be0c9a5cb179baffc538392e45b37d09d919d
    Size: 235.27 kB
  6. rh-postgresql95-postgresql-plperl-9.5.14-1.AXS4.x86_64.rpm
    MD5: 4f3ed491eaa466e2a804234f652f6a95
    SHA-256: a8bebddbc6ded1acaa9993aefbb1b250ebfd61018728ed746f1cd04efbb4d776
    Size: 85.15 kB
  7. rh-postgresql95-postgresql-plpython-9.5.14-1.AXS4.x86_64.rpm
    MD5: bff8f1cf4d859a9899d33fdb4acc139f
    SHA-256: 1558a9728558ecb69e388f5494842471d2cce2f7162d4cc0541f48c68c222127
    Size: 97.64 kB
  8. rh-postgresql95-postgresql-pltcl-9.5.14-1.AXS4.x86_64.rpm
    MD5: 83f7dca3f3553f30a04a0482a5ec0ef6
    SHA-256: c3bf7216fb1796fc7a9fb90cf7f97abc2605129283f068b8a3dbb71d577b064c
    Size: 62.81 kB
  9. rh-postgresql95-postgresql-server-9.5.14-1.AXS4.x86_64.rpm
    MD5: bbc7a9a04f7647dda29c22ea14861e0f
    SHA-256: 626263246c66672c2faa575ca918db38d8fd3a54e7a30a0c7bb4915cf53a6d41
    Size: 4.82 MB
  10. rh-postgresql95-postgresql-static-9.5.14-1.AXS4.x86_64.rpm
    MD5: b4105deb3cedb9ca26e5d63514c852c5
    SHA-256: bb63acf2838e1357de24808ba19e915c282a63e5de442d76a8657eead8016be9
    Size: 120.98 kB
  11. rh-postgresql95-postgresql-test-9.5.14-1.AXS4.x86_64.rpm
    MD5: c11567216b9c9a7497d31346ab7d8f96
    SHA-256: d04be8f317278a46cb43ed0ad3a37f5ca5bbd812793dfaca1d8d880136464910
    Size: 1.48 MB