First published: Mon Jul 30 2018(Updated: )
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cfme | <0:5.9.6.5-3.el7cf | 0:5.9.6.5-3.el7cf |
redhat/cfme-amazon-smartstate | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/cfme-appliance | <0:5.9.6.5-1.el7cf | 0:5.9.6.5-1.el7cf |
redhat/cfme-gemset | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/dbus-api-service | <0:1.0.1-3.1.el7cf | 0:1.0.1-3.1.el7cf |
redhat/httpd-configmap-generator | <0:0.2.2-1.2.el7cf | 0:0.2.2-1.2.el7cf |
redhat/postgresql96 | <0:9.6.10-1PGDG.el7a | 0:9.6.10-1PGDG.el7a |
redhat/postgresql | <0:9.2.24-1.el7_5 | 0:9.2.24-1.el7_5 |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el6 | 0:9.5.14-1.el6 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el6 | 0:9.6.10-1.el6 |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el7 | 0:9.5.14-1.el7 |
redhat/rh-postgresql10-postgresql | <0:10.5-1.el7 | 0:10.5-1.el7 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el7 | 0:9.6.10-1.el7 |
redhat/rhvm-appliance | <0:4.2-20180828.0.el7 | 0:4.2-20180828.0.el7 |
debian/postgresql-10 | ||
debian/postgresql-9.1 | ||
redhat/postgresql | <10.5 | 10.5 |
redhat/postgresql | <9.6.10 | 9.6.10 |
redhat/postgresql | <9.5.14 | 9.5.14 |
redhat/postgresql | <9.4.19 | 9.4.19 |
redhat/postgresql | <9.3.24 | 9.3.24 |
ubuntu/postgresql-10 | <10.5-0ubuntu0.18.04 | 10.5-0ubuntu0.18.04 |
ubuntu/postgresql-10 | <10.5-1 | 10.5-1 |
ubuntu/postgresql-9.3 | <9.3.24-0ubuntu0.14.04 | 9.3.24-0ubuntu0.14.04 |
ubuntu/postgresql-9.3 | <9.4.24 | 9.4.24 |
ubuntu/postgresql-9.5 | <9.5.14 | 9.5.14 |
ubuntu/postgresql-9.5 | <9.5.14-0ubuntu0.16.04 | 9.5.14-0ubuntu0.16.04 |
Red Hat OpenStack for IBM Power | =12 | |
Red Hat OpenStack for IBM Power | =13 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
PostgreSQL | >=9.3.0<9.3.24 | |
PostgreSQL | >=9.4.0<9.4.19 | |
PostgreSQL | >=9.5.0<9.5.14 | |
PostgreSQL | >=9.6.0<9.6.10 | |
PostgreSQL | >=10.0<10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2018-10915.
The severity level of vulnerability CVE-2018-10915 is high with a CVSS score of 8.5.
The affected software versions are PostgreSQL versions 9.3.0 to 9.3.24, 9.4.0 to 9.4.19, 9.5.0 to 9.5.14, 9.6.0 to 9.6.10, and 10.0 to 10.5.
To fix vulnerability CVE-2018-10915, you need to update to PostgreSQL versions 9.3.25, 9.4.20, 9.5.15, 9.6.11, or 10.6, depending on the version you are using.
You can find more information about vulnerability CVE-2018-10915 on the PostgreSQL website and the Red Hat Bugzilla page.