It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with “INSERT … ON CONFLICT DO UPDATE”. An attacker with “CREATE TABLE” privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain “INSERT” and limited “UPDATE” privileges to a particular table, they could exploit this to update other columns in the same table.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 18.04 | |
debian_linux | eq | 9.0 | |
postgresql | ge | 9.5.0 | |
postgresql | lt | 9.5.14 | |
postgresql | ge | 9.6.0 | |
postgresql | lt | 9.6.10 | |
postgresql | ge | 10.0 | |
postgresql | lt | 10.5 |
lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
www.securityfocus.com/bid/105052
www.securitytracker.com/id/1041446
access.redhat.com/errata/RHSA-2018:2511
access.redhat.com/errata/RHSA-2018:2565
access.redhat.com/errata/RHSA-2018:2566
access.redhat.com/errata/RHSA-2018:3816
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925
security.gentoo.org/glsa/201810-08
usn.ubuntu.com/3744-1/
www.debian.org/security/2018/dsa-4269
www.postgresql.org/about/news/1878/