Lucene search

K
archlinuxArchLinuxASA-201711-18
HistoryNov 10, 2017 - 12:00 a.m.

[ASA-201711-18] postgresql-old-upgrade: multiple issues

2017-11-1000:00:00
security.archlinux.org
10

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

5.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

0.008 Low

EPSS

Percentile

80.9%

Arch Linux Security Advisory ASA-201711-18

Severity: Medium
Date : 2017-11-10
CVE-ID : CVE-2017-15098 CVE-2017-15099
Package : postgresql-old-upgrade
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-486

Summary

The package postgresql-old-upgrade before version 9.6.6-1 is vulnerable
to multiple issues including access restriction bypass and information
disclosure.

Resolution

Upgrade to 9.6.6-1.

pacman -Syu “postgresql-old-upgrade>=9.6.6-1”

The problems have been fixed upstream in version 9.6.6.

Workaround

None.

Description

  • CVE-2017-15098 (information disclosure)

A denial of service and potential memory disclosure vulnerability has
been discovered in PostgreSQL in the json_populate_recordset() and
jsonb_populate_recordset() functions.

  • CVE-2017-15099 (access restriction bypass)

An access restriction bypass vulnerability has been discovered in
PostgreSQL, the “INSERT … ON CONFLICT DO UPDATE” would not check to
see if the executing user had permission to perform a “SELECT” on the
index performing the conflicting check. Additionally, in a table with
row-level security enabled, the “INSERT … ON CONFLICT DO UPDATE”
would not check the SELECT policies for that table before performing
the update.
The fix ensures that “INSERT … ON CONFLICT DO UPDATE” checks against
table permissions and RLS policies before executing.

Impact

A remote attacker is able to bypass access restrictions via certain
queries or possibly leak sensitive information from the running
process.

References

https://www.postgresql.org/about/news/1801/
https://security.archlinux.org/CVE-2017-15098
https://security.archlinux.org/CVE-2017-15099

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanypostgresql-old-upgrade< 9.6.6-1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

5.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:N/A:P

0.008 Low

EPSS

Percentile

80.9%