Bug 1609891 - (CVE-2018-10915) CVE-2018-10915 postgresql: Certain host connection parameters defeat client-side security defenses
CVE-2018-10915 postgresql: Certain host connection parameters defeat client-s...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1612667 1612668 1612669 1612670 1612671 1612672 1612673 1612674 1612683 1612684 1614403 1614405 1614407 1614583 1612665 1612666 1612675 1612676 1614404
Blocks: 1609892
  Show dependency treegraph
Reported: 2018-07-30 14:12 EDT by Laura Pardo
Modified: 2018-08-14 05:36 EDT (History)
64 users (show)

See Also:
Fixed In Version: postgresql 10.5, postgresql 9.6.10, postgresql 9.5.14, postgresql 9.4.19, postgresql 9.3.24
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq were used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction.
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Laura Pardo 2018-07-30 14:12:44 EDT
A flaw was found in PostgreSQL. The chief PostgreSQL client library, libpq, does not adequately reset its internal state before each connection attempt. When one requests a connection using a "host" or "hostaddr" connection parameter provided by an untrusted party, that party can thwart three security-relevant features of the client. First, they can cause PQconnectionUsedPassword() to erroneously return true. Users of contrib module "dblink" or "postgres_fdw" can leverage that to use server-side login credentials that they should not be able to use. Second, attackers can cause the PQescape*() family of functions to malfunction, permitting SQL injection in "postgres_fdw" and likely in other applications. Third, attackers can cause sslmode=prefer to not attempt SSL/TLS at all
Comment 2 Doran Moppert 2018-08-06 02:11:01 EDT

This vulnerability is only exploitable where an attacker can provide or influence connection parameters to a PostgreSQL client application using libpq. Contrib modules "dblink" and "postgres_fdw" are examples of applications affected by this flaw.

Red Hat Virtualization includes vulnerable versions of postgresql. However this flaw is not known to be exploitable under any supported configuration of Red Hat Virtualization. A future update may address this issue.
Comment 5 Doran Moppert 2018-08-09 01:51:10 EDT

Name: the PostgreSQL project
Upstream: Andrew Krasichkov
Comment 7 Doran Moppert 2018-08-09 10:23:19 EDT
External References:

Comment 8 Doran Moppert 2018-08-09 10:24:22 EDT
Created mingw-postgresql tracking bugs for this issue:

Affects: epel-7 [bug 1614405]
Affects: fedora-all [bug 1614407]

Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 1614404]

Note You need to log in before you can comment on or make changes to this bug.