[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2017:2425-01 -- Redhat rh-postgresql95-postgresql, spacewalk-postgresql-server, spacewalk-setup-postgresql, spacewalk-web, spacewalk-backend, spacewalk-utils

ID: oval:org.secpod.oval:def:505531Date: (C)2021-01-04   (M)2022-09-23
Class: PATCHFamily: unix




PostgreSQL is an advanced object-relational database management system . The following packages have been upgraded to a later upstream version: rh-postgresql95-postgresql . Security Fix: * A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code. * A flaw was found in the way PostgreSQL client programs handled database and role names containing newlines, carriage returns, double quotes, or backslashes. By crafting such an object name, roles with the CREATEDB or CREATEROLE option could escalate their privileges to superuser when a superuser next executes maintenance with a vulnerable client program. * It was found that some selectivity estimation functions did not check user privileges before providing information from pg_statistic, possibly leaking information. A non-administrative database user could use this flaw to steal some information from tables they are otherwise not allowed to access. * It was discovered that the PostgreSQL client library did not enforce the use of TLS/SSL for a connection to a PostgreSQL server when the PGREQUIRESSL environment variable was set. An man-in-the-middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server. * It was found that the pg_user_mappings view could disclose information about user mappings to a foreign database to non-administrative database users. A database user with USAGE privilege for this mapping could, when querying the view, obtain user mapping data, such as the username and password used to connect to the foreign database. Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Robert Haas as the original reporter of CVE-2017-7484; Daniel Gustafsson as the original reporter of CVE-2017-7485; and Andrew Wheelwright as the original reporter of CVE-2017-7486.

Platform:
Red Hat Enterprise Linux 6
Product:
rh-postgresql95-postgresql
spacewalk-postgresql-server
spacewalk-setup-postgresql
spacewalk-web
spacewalk-backend
spacewalk-utils
Reference:
RHSA-2017:2425-01
CVE-2016-5423
CVE-2016-5424
CVE-2017-7484
CVE-2017-7485
CVE-2017-7486
CVE    5
CVE-2016-5423
CVE-2016-5424
CVE-2017-7486
CVE-2017-7485
...
CPE    7
cpe:/a:spacewalk:spacewalk-web
cpe:/o:redhat:enterprise_linux:6
cpe:/a:spacewalk:spacewalk-backend
cpe:/a:spacewalk:spacewalk-postgresql-server
...

© SecPod Technologies