First published: Mon Aug 06 2018(Updated: )
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/postgresql-10 | ||
debian/postgresql-9.1 | ||
redhat/postgresql | <10.5 | 10.5 |
redhat/postgresql | <9.6.10 | 9.6.10 |
redhat/postgresql | <9.5.14 | 9.5.14 |
ubuntu/postgresql-10 | <10.5-0ubuntu0.18.04 | 10.5-0ubuntu0.18.04 |
ubuntu/postgresql-10 | <10.5-1 | 10.5-1 |
ubuntu/postgresql-9.5 | <9.5.14 | 9.5.14 |
ubuntu/postgresql-9.5 | <9.5.14-0ubuntu0.16.04 | 9.5.14-0ubuntu0.16.04 |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Debian | =9.0 | |
PostgreSQL Client | >=9.5.0<9.5.14 | |
PostgreSQL Client | >=9.6.0<9.6.10 | |
PostgreSQL Client | >=10.0<10.5 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10925 is a vulnerability in PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 that failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE".
CVE-2018-10925 allows an attacker with "CREATE TABLE" privileges to read arbitrary bytes from the server memory.
The severity of CVE-2018-10925 is high, with a severity value of 8.1.
PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected by CVE-2018-10925.
To fix CVE-2018-10925, upgrade to PostgreSQL version 10.5, 9.6.10, 9.5.14, 9.4.19, or 9.3.24.