seeing is believing

Red Hat Security Advisory 2017-2425-01

Red Hat Security Advisory 2017-2425-01
Posted Aug 7, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2425-01 - PostgreSQL is an advanced object-relational database management system. The following packages have been upgraded to a later upstream version: rh-postgresql95-postgresql. Security Fix: A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code.

tags | advisory, remote, arbitrary
systems | linux, redhat
advisories | CVE-2016-5423, CVE-2016-5424, CVE-2017-7484, CVE-2017-7485, CVE-2017-7486
MD5 | 263221ff22eba88ab8c3e3bb948618c2

Red Hat Security Advisory 2017-2425-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: rh-postgresql95-postgresql security update
Advisory ID: RHSA-2017:2425-01
Product: Red Hat Satellite
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2425
Issue date: 2017-08-07
CVE Names: CVE-2016-5423 CVE-2016-5424 CVE-2017-7484
CVE-2017-7485 CVE-2017-7486
=====================================================================

1. Summary:

An update for rh-postgresql95-postgresql is now available for Red Hat
Satellite 5.7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

This update applies only to Satellite 5.7 instances using either embedded
or managed PostgreSQL databases.

There are manual steps required in order to finish the migration from
postgresql92-postgresql to rh-postgresql95-postgresql. If these steps are
not undertaken, the affected Satellite will continue to use PostgreSQL 9.2.

postgresql92-postgresql will be upgraded automatically to
rh-postgresql95-postgresql as part of an upgrade to Satellite 5.8.

2. Relevant releases/architectures:

Red Hat Satellite 5.7 (RHEL v.6) - noarch, s390x, x86_64
Red Hat Satellite Managed DB 5.7 (RHEL v.6) - noarch, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
rh-postgresql95-postgresql (9.5.7). (BZ#1449701)

Security Fix(es):

* A flaw was found in the way PostgreSQL server handled certain SQL
statements containing CASE/WHEN commands. A remote, authenticated attacker
could use a specially crafted SQL statement to cause PostgreSQL to crash or
disclose a few bytes of server memory or possibly execute arbitrary code.
(CVE-2016-5423)

* A flaw was found in the way PostgreSQL client programs handled database
and role names containing newlines, carriage returns, double quotes, or
backslashes. By crafting such an object name, roles with the CREATEDB or
CREATEROLE option could escalate their privileges to superuser when a
superuser next executes maintenance with a vulnerable client program.
(CVE-2016-5424)

* It was found that some selectivity estimation functions did not check
user privileges before providing information from pg_statistic, possibly
leaking information. A non-administrative database user could use this flaw
to steal some information from tables they are otherwise not allowed to
access. (CVE-2017-7484)

* It was discovered that the PostgreSQL client library (libpq) did not
enforce the use of TLS/SSL for a connection to a PostgreSQL server when the
PGREQUIRESSL environment variable was set. An man-in-the-middle attacker
could use this flaw to strip the SSL/TLS protection from a connection
between a client and a server. (CVE-2017-7485)

* It was found that the pg_user_mappings view could disclose information
about user mappings to a foreign database to non-administrative database
users. A database user with USAGE privilege for this mapping could, when
querying the view, obtain user mapping data, such as the username and
password used to connect to the foreign database. (CVE-2017-7486)

Red Hat would like to thank the PostgreSQL project for reporting these
issues. Upstream acknowledges Robert Haas as the original reporter of
CVE-2017-7484; Daniel Gustafsson as the original reporter of CVE-2017-7485;
and Andrew Wheelwright as the original reporter of CVE-2017-7486.

4. Solution:

As part of this upgrade, PostgreSQL data files will be moved from
/opt/rh/postgresql92/root/var/lib/pgsql/ to
/var/opt/rh/rh-postgresql95/lib/pgsql/.

Before proceeding with command line portion of the upgrade please insure
that there is enough free space under the /var/opt directory. The amount of
free space required should be at least equal to size of your
/opt/rh/postgresql92/root/var/lib/pgsql/ directory. This size can be
determined using the following command:

du -sh /opt/rh/postgresql92/root/var/lib/pgsql/

After updating packages, run following command on your database machine
(NOTE: in the embedded-database case this is the Satellite system itself;
otherwise, run the command on the system running your PostgreSQL database):

/usr/bin/spacewalk-upgrade-postgresql

postgresql92-postgresql will be upgraded to rh-postgresql95-postgresql.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1364001 - CVE-2016-5423 postgresql: CASE/WHEN with inlining can cause untrusted pointer dereference
1364002 - CVE-2016-5424 postgresql: privilege escalation via crafted database and role names
1434418 - Upgrade PostgreSQL to 9.5
1448078 - CVE-2017-7484 postgresql: Selectivity estimators bypass SELECT privilege checks
1448086 - CVE-2017-7485 postgresql: libpq ignores PGREQUIRESSL environment variable
1448089 - CVE-2017-7486 postgresql: pg_user_mappings view discloses foreign server passwords

6. Package List:

Red Hat Satellite Managed DB 5.7 (RHEL v.6):

Source:
rh-postgresql95-postgresql-9.5.7-2.el6.src.rpm
spacewalk-postgresql-server-9.5-1.el6sat.src.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.src.rpm
spacewalk-web-2.3.2-35.el6sat.src.rpm

noarch:
spacewalk-base-minimal-2.3.2-35.el6sat.noarch.rpm
spacewalk-dobby-2.3.2-35.el6sat.noarch.rpm
spacewalk-postgresql-server-9.5-1.el6sat.noarch.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.noarch.rpm

s390x:
rh-postgresql95-postgresql-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.s390x.rpm
rh-postgresql95-runtime-2.2-3.el6.s390x.rpm

x86_64:
rh-postgresql95-postgresql-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-runtime-2.2-3.el6.x86_64.rpm

Red Hat Satellite 5.7 (RHEL v.6):

Source:
rh-postgresql95-postgresql-9.5.7-2.el6.src.rpm
spacewalk-backend-2.3.3-53.el6sat.src.rpm
spacewalk-postgresql-server-9.5-1.el6sat.src.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.src.rpm
spacewalk-utils-2.3.2-32.el6sat.src.rpm
spacewalk-web-2.3.2-35.el6sat.src.rpm

noarch:
spacewalk-backend-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-app-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-applet-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-common-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-config-files-tool-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-iss-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-iss-export-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-libs-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-package-push-server-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-server-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-oracle-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-sql-postgresql-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-tools-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-xml-export-libs-2.3.3-53.el6sat.noarch.rpm
spacewalk-backend-xmlrpc-2.3.3-53.el6sat.noarch.rpm
spacewalk-base-2.3.2-35.el6sat.noarch.rpm
spacewalk-base-minimal-2.3.2-35.el6sat.noarch.rpm
spacewalk-base-minimal-config-2.3.2-35.el6sat.noarch.rpm
spacewalk-dobby-2.3.2-35.el6sat.noarch.rpm
spacewalk-grail-2.3.2-35.el6sat.noarch.rpm
spacewalk-html-2.3.2-35.el6sat.noarch.rpm
spacewalk-postgresql-server-9.5-1.el6sat.noarch.rpm
spacewalk-pxt-2.3.2-35.el6sat.noarch.rpm
spacewalk-setup-postgresql-2.3.0-27.el6sat.noarch.rpm
spacewalk-sniglets-2.3.2-35.el6sat.noarch.rpm
spacewalk-utils-2.3.2-32.el6sat.noarch.rpm

s390x:
rh-postgresql95-postgresql-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.s390x.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.s390x.rpm
rh-postgresql95-runtime-2.2-3.el6.s390x.rpm

x86_64:
rh-postgresql95-postgresql-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-contrib-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-debuginfo-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-libs-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-pltcl-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-postgresql-server-9.5.7-2.el6.x86_64.rpm
rh-postgresql95-runtime-2.2-3.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-5423
https://access.redhat.com/security/cve/CVE-2016-5424
https://access.redhat.com/security/cve/CVE-2017-7484
https://access.redhat.com/security/cve/CVE-2017-7485
https://access.redhat.com/security/cve/CVE-2017-7486
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFZiJKFXlSAg2UNWIIRAgghAJ41FncOcjj114YXdBU4384SnIfpXQCghfjP
jfT6QejGNp/PgAj65t6GgIs=
=YaOP
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    12 Files
  • 23
    Sep 23rd
    2 Files
  • 24
    Sep 24th
    2 Files
  • 25
    Sep 25th
    11 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close