Bug 1609891 (CVE-2018-10915)

Summary: CVE-2018-10915 postgresql: Certain host connection parameters defeat client-side security defenses
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abergmann, abhgupta, anon.amish, bkearney, bmcclain, cmacedo, dajohnso, databases-maint, dbaker, dblechte, devrim, dfediuck, dffrench, dmetzger, dmoppert, drusso, eedri, gblomqui, gmainwar, gmccullo, gtanzill, hhorak, jfrey, jhardy, jlaska, jmadigan, jmlich83, jokerman, jorton, jprause, jshepherd, jstanek, kdixon, lgriffin, meissner, mgoldboi, michal.skrivanek, mike, msrb, ngough, nlevy, obarenbo, pkajaba, pkubat, praiskup, pwright, roliveri, rpetrell, sbonazzo, security-response-team, sherold, simaishi, smcdonal, sthangav, tgl, thoger, tlestach, trankin, trepel, yozone, yselkowi, yturgema
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: postgresql 10.5, postgresql 9.6.10, postgresql 9.5.14, postgresql 9.4.19, postgresql 9.3.24 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq were used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:34:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1612665, 1612666, 1612667, 1612668, 1612669, 1612670, 1612671, 1612672, 1612673, 1612674, 1612675, 1612676, 1612683, 1612684, 1614403, 1614404, 1614405, 1614407, 1614583, 1616249, 1622771, 1622772, 1626036, 1626037, 1626038, 1626039, 1626040    
Bug Blocks: 1609892    

Description Laura Pardo 2018-07-30 18:12:44 UTC
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all

Comment 5 Doran Moppert 2018-08-09 05:51:10 UTC
Acknowledgments:

Name: the PostgreSQL project
Upstream: Andrew Krasichkov

Comment 7 Doran Moppert 2018-08-09 14:23:19 UTC
External References:

https://www.postgresql.org/about/news/1878/

Comment 8 Doran Moppert 2018-08-09 14:24:22 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1614405]
Affects: fedora-all [bug 1614407]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1614404]

Comment 16 errata-xmlrpc 2018-08-20 10:50:37 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2511 https://access.redhat.com/errata/RHSA-2018:2511

Comment 17 errata-xmlrpc 2018-08-23 15:10:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2557 https://access.redhat.com/errata/RHSA-2018:2557

Comment 18 errata-xmlrpc 2018-08-27 08:21:20 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2565 https://access.redhat.com/errata/RHSA-2018:2565

Comment 19 errata-xmlrpc 2018-08-27 08:35:13 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2566 https://access.redhat.com/errata/RHSA-2018:2566

Comment 20 Cedric Buissart 2018-08-27 09:19:19 UTC
Statement:

This vulnerability is only exploitable where an attacker can provide or influence connection parameters to a PostgreSQL client application using libpq. Contrib modules "dblink" and "postgres_fdw" are examples of applications affected by this flaw.

Red Hat Virtualization includes vulnerable versions of postgresql. However this flaw is not known to be exploitable under any supported configuration of Red Hat Virtualization. A future update may address this issue.

This issue affects the versions of the rh-postgresql95-postgresql package as shipped with Red Hat Satellite 5.7 and 5.8. However, this flaw is not known to be exploitable under any supported scenario in Satellite 5. A future update may address this issue.

Comment 24 errata-xmlrpc 2018-09-04 13:46:28 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Via RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643

Comment 32 errata-xmlrpc 2018-12-13 15:15:18 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.9

Via RHSA-2018:3816 https://access.redhat.com/errata/RHSA-2018:3816