Bug 1622225 (CVE-2018-10936)
Summary: | CVE-2018-10936 PostgreSQL: Postgres JDBC driver does not perform host name validation by default | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abhgupta, bmcclain, cmacedo, dajohnso, databases-maint, dbaker, dfediuck, dffrench, dmetzger, dmoppert, drusso, eedri, gblomqui, gmccullo, gtanzill, hhorak, jhardy, jlaska, jmadigan, jokerman, jprause, jshepherd, kdixon, lgriffin, mgoldboi, michal.skrivanek, ngough, pkubat, praiskup, pwright, roliveri, sbonazzo, security-response-team, sherold, simaishi, sthangav, tgl, trankin, trepel |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | postgresql-jdbc 42.2.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
A weakness was found in postgresql-jdbc. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-10-25 22:17:32 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1623713, 1623714, 1664337 | ||
Bug Blocks: | 1622227 |
Description
Pedro Sampaio
2018-08-24 19:35:23 UTC
Acknowledgments: Name: the PostgreSQL project Upstream down-rated the severity of this issue on making it public. The default configuration in fact would validate host names, but it was possible to provide an SSLFactory that would not. In 42.2.5, the documentation and API has been improved for clarity to avoid this mistake. External References: https://www.postgresql.org/about/news/1883/ Tower does not use any java stuff or any JDBC driver at all. CloudForms does not use java (it isn't even installed in the appliance), hence it is not affected. Created postgresql-jdbc tracking bugs for this issue: Affects: fedora-all [bug 1664337] Mitigation: Applications using postgresql-jdbc should have their SSL configuration reviewed to ensure that host name verification is not disabled and only trusted CAs are accepted. This vulnerability only impacts usage of postgresql-jdbc with a non-default SSL Factory, provided by the `sslfactory` parameter. If this parameter is not given, the default LibPQFactory is used, which is not vulnerable. |