Bug 1609891 (CVE-2018-10915) - CVE-2018-10915 postgresql: Certain host connection parameters defeat client-side security defenses
Summary: CVE-2018-10915 postgresql: Certain host connection parameters defeat client-s...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-10915
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: Engineering1612665 Engineering1612666 Engineering1612667 Engineering1612668 Engineering1612669 Engineering1612670 Engineering1612671 Engineering1612672 Engineering1612673 Engineering1612674 Engineering1612675 Engineering1612676 Engineering1612683 Engineering1612684 Engineering1614403 1614404 1614405 1614407 Engineering1614583 rhvm-appliance-4.2.6 Red Hat1622771 Red Hat1622772 Red Hat1626036 Red Hat1626037 Red Hat1626038 Red Hat1626039 Red Hat1626040
Blocks: Embargoed1609892
TreeView+ depends on / blocked
 
Reported: 2018-07-30 18:12 UTC by Laura Pardo
Modified: 2022-03-13 15:19 UTC (History)
62 users (show)

Fixed In Version: postgresql 10.5, postgresql 9.6.10, postgresql 9.5.14, postgresql 9.4.19, postgresql 9.3.24
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq were used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction.
Clone Of:
Environment:
Last Closed: 2019-06-10 10:34:30 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2511 0 None None None 2018-08-20 10:50:55 UTC
Red Hat Product Errata RHSA-2018:2557 0 None None None 2018-08-23 15:10:46 UTC
Red Hat Product Errata RHSA-2018:2565 0 None None None 2018-08-27 08:21:37 UTC
Red Hat Product Errata RHSA-2018:2566 0 None None None 2018-08-27 08:35:33 UTC
Red Hat Product Errata RHSA-2018:2643 0 None None None 2018-09-04 13:46:53 UTC
Red Hat Product Errata RHSA-2018:3816 0 None None None 2018-12-13 15:15:21 UTC

Description Laura Pardo 2018-07-30 18:12:44 UTC
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all

Comment 5 Doran Moppert 2018-08-09 05:51:10 UTC
Acknowledgments:

Name: the PostgreSQL project
Upstream: Andrew Krasichkov

Comment 7 Doran Moppert 2018-08-09 14:23:19 UTC
External References:

https://www.postgresql.org/about/news/1878/

Comment 8 Doran Moppert 2018-08-09 14:24:22 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1614405]
Affects: fedora-all [bug 1614407]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1614404]

Comment 16 errata-xmlrpc 2018-08-20 10:50:37 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2511 https://access.redhat.com/errata/RHSA-2018:2511

Comment 17 errata-xmlrpc 2018-08-23 15:10:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2557 https://access.redhat.com/errata/RHSA-2018:2557

Comment 18 errata-xmlrpc 2018-08-27 08:21:20 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2565 https://access.redhat.com/errata/RHSA-2018:2565

Comment 19 errata-xmlrpc 2018-08-27 08:35:13 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS

Via RHSA-2018:2566 https://access.redhat.com/errata/RHSA-2018:2566

Comment 20 Cedric Buissart 2018-08-27 09:19:19 UTC
Statement:

This vulnerability is only exploitable where an attacker can provide or influence connection parameters to a PostgreSQL client application using libpq. Contrib modules "dblink" and "postgres_fdw" are examples of applications affected by this flaw.

Red Hat Virtualization includes vulnerable versions of postgresql. However this flaw is not known to be exploitable under any supported configuration of Red Hat Virtualization. A future update may address this issue.

This issue affects the versions of the rh-postgresql95-postgresql package as shipped with Red Hat Satellite 5.7 and 5.8. However, this flaw is not known to be exploitable under any supported scenario in Satellite 5. A future update may address this issue.

Comment 24 errata-xmlrpc 2018-09-04 13:46:28 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 7

Via RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643

Comment 32 errata-xmlrpc 2018-12-13 15:15:18 UTC
This issue has been addressed in the following products:

  CloudForms Management Engine 5.9

Via RHSA-2018:3816 https://access.redhat.com/errata/RHSA-2018:3816


Note You need to log in before you can comment on or make changes to this bug.