First published: Mon Jul 30 2018(Updated: )
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cfme | <0:5.9.6.5-3.el7cf | 0:5.9.6.5-3.el7cf |
redhat/cfme-amazon-smartstate | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/cfme-appliance | <0:5.9.6.5-1.el7cf | 0:5.9.6.5-1.el7cf |
redhat/cfme-gemset | <0:5.9.6.5-2.el7cf | 0:5.9.6.5-2.el7cf |
redhat/dbus-api-service | <0:1.0.1-3.1.el7cf | 0:1.0.1-3.1.el7cf |
redhat/httpd-configmap-generator | <0:0.2.2-1.2.el7cf | 0:0.2.2-1.2.el7cf |
redhat/postgresql96 | <0:9.6.10-1PGDG.el7a | 0:9.6.10-1PGDG.el7a |
redhat/postgresql | <0:9.2.24-1.el7_5 | 0:9.2.24-1.el7_5 |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el6 | 0:9.5.14-1.el6 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el6 | 0:9.6.10-1.el6 |
redhat/rh-postgresql95-postgresql | <0:9.5.14-1.el7 | 0:9.5.14-1.el7 |
redhat/rh-postgresql10-postgresql | <0:10.5-1.el7 | 0:10.5-1.el7 |
redhat/rh-postgresql96-postgresql | <0:9.6.10-1.el7 | 0:9.6.10-1.el7 |
redhat/rhvm-appliance | <0:4.2-20180828.0.el7 | 0:4.2-20180828.0.el7 |
debian/postgresql-10 | ||
debian/postgresql-9.1 | ||
redhat/postgresql | <10.5 | 10.5 |
redhat/postgresql | <9.6.10 | 9.6.10 |
redhat/postgresql | <9.5.14 | 9.5.14 |
redhat/postgresql | <9.4.19 | 9.4.19 |
redhat/postgresql | <9.3.24 | 9.3.24 |
ubuntu/postgresql-10 | <10.5-0ubuntu0.18.04 | 10.5-0ubuntu0.18.04 |
ubuntu/postgresql-10 | <10.5-1 | 10.5-1 |
ubuntu/postgresql-9.3 | <9.3.24-0ubuntu0.14.04 | 9.3.24-0ubuntu0.14.04 |
ubuntu/postgresql-9.3 | <9.4.24 | 9.4.24 |
ubuntu/postgresql-9.5 | <9.5.14 | 9.5.14 |
ubuntu/postgresql-9.5 | <9.5.14-0ubuntu0.16.04 | 9.5.14-0ubuntu0.16.04 |
redhat openstack | =12 | |
redhat openstack | =13 | |
Red Hat Enterprise Virtualization | =4.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Debian | =8.0 | |
Debian | =9.0 | |
PostgreSQL JDBC Driver | >=9.3.0<9.3.24 | |
PostgreSQL JDBC Driver | >=9.4.0<9.4.19 | |
PostgreSQL JDBC Driver | >=9.5.0<9.5.14 | |
PostgreSQL JDBC Driver | >=9.6.0<9.6.10 | |
PostgreSQL JDBC Driver | >=10.0<10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2018-10915.
The severity level of vulnerability CVE-2018-10915 is high with a CVSS score of 8.5.
The affected software versions are PostgreSQL versions 9.3.0 to 9.3.24, 9.4.0 to 9.4.19, 9.5.0 to 9.5.14, 9.6.0 to 9.6.10, and 10.0 to 10.5.
To fix vulnerability CVE-2018-10915, you need to update to PostgreSQL versions 9.3.25, 9.4.20, 9.5.15, 9.6.11, or 10.6, depending on the version you are using.
You can find more information about vulnerability CVE-2018-10915 on the PostgreSQL website and the Red Hat Bugzilla page.