First published: Thu Aug 16 2018(Updated: )
Andrew Krasichkov discovered that the PostgreSQL client library incorrectly reset its internal state between connections. A remote attacker could possibly use this issue to bypass certain client-side connection security features. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-10915) It was discovered that PostgreSQL incorrectly checked authorization on certain statements. A remote attacker could possibly use this issue to read arbitrary server memory or alter certain data. (CVE-2018-10925)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/postgresql-10 | <10.5-0ubuntu0.18.04 | 10.5-0ubuntu0.18.04 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/postgresql-9.5 | <9.5.14-0ubuntu0.16.04 | 9.5.14-0ubuntu0.16.04 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/postgresql-9.3 | <9.3.24-0ubuntu0.14.04 | 9.3.24-0ubuntu0.14.04 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10915.
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 14.04 LTS are affected.
A remote attacker could potentially bypass certain client-side connection security features.
Upgrade to the specified patched versions of PostgreSQL: 10.5-0ubuntu0.18.04 for Ubuntu 18.04 LTS, 9.5.14-0ubuntu0.16.04 for Ubuntu 16.04 LTS, and 9.3.24-0ubuntu0.14.04 for Ubuntu 14.04 LTS.
You can find more information about this vulnerability on the Ubuntu Security Notices website: [link](https://ubuntu.com/security/CVE-2018-10915).