Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2018:3449-1

Опубликовано: 25 окт. 2018
Источник: suse-cvrf

Описание

Security update for postgresql96

This update for postgresql96 to 9.6.10 fixes the following issues:

These security issues were fixed:

  • CVE-2018-10915: libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with 'host' or 'hostaddr' connection parameters from untrusted input, attackers could have bypassed client-side connection security features, obtain access to higher privileged connections or potentially cause other impact SQL injection, by causing the PQescape() functions to malfunction (bsc#1104199)
  • CVE-2018-10925: Add missing authorization check on certain statements involved with 'INSERT ... ON CONFLICT DO UPDATE'. An attacker with 'CREATE TABLE' privileges could have exploited this to read arbitrary bytes server memory. If the attacker also had certain 'INSERT' and limited 'UPDATE' privileges to a particular table, they could have exploited this to update other columns in the same table (bsc#1104202)

For addition details please see https://www.postgresql.org/docs/current/static/release-9-6-10.html

This update was imported from the SUSE:SLE-12:Update update project.

Список пакетов

openSUSE Leap 42.3
postgresql96-9.6.10-21.1
postgresql96-contrib-9.6.10-21.1
postgresql96-devel-9.6.10-21.1
postgresql96-docs-9.6.10-21.1
postgresql96-libs-9.6.10-21.1
postgresql96-plperl-9.6.10-21.1
postgresql96-plpython-9.6.10-21.1
postgresql96-pltcl-9.6.10-21.1
postgresql96-server-9.6.10-21.1
postgresql96-test-9.6.10-21.1

Описание

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.


Затронутые продукты
openSUSE Leap 42.3:postgresql96-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-contrib-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-devel-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-docs-9.6.10-21.1

Ссылки

Описание

It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.


Затронутые продукты
openSUSE Leap 42.3:postgresql96-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-contrib-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-devel-9.6.10-21.1
openSUSE Leap 42.3:postgresql96-docs-9.6.10-21.1

Ссылки
Уязвимость openSUSE-SU-2018:3449-1