SB2018051430 - Security restrictions bypass in postgresql (Alpine package)
Published: May 14, 2018
Security Bulletin ID
SB2018051430
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Security restrictions bypass (CVE-ID: CVE-2018-1115)
The vulnerability allows a remote authenticated attacker to bypass security restrictions on the target system.The weakness exists in the pg_catalog.pg_logfile_rotate() function due to improper Access Control List (ACL) restrictions as it does not follow the same ACLs as the pg_rorate_logfile function. A remote attacker can connect to the database and cause the target software to force log rotation, write log messages across arbitrary log files or cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=5600c80ab97b0bed725ec1c24f981a765e54593b
- https://git.alpinelinux.org/aports/commit/?id=2b95c8929982c3ff86b48ffe921cf9ddff6aeebd
- https://git.alpinelinux.org/aports/commit/?id=5f580c412de14f7329bf77293a1c8bbce8a74d48
- https://git.alpinelinux.org/aports/commit/?id=142c9bf9b9b11c11bea7ddc0a791738c9e17bb38
- https://git.alpinelinux.org/aports/commit/?id=2d38d79dfbb716fae92d25e4a7d70bbe1ff09a57
- https://git.alpinelinux.org/aports/commit/?id=9413330e55d1431c18c7df8b66ad98cdc9d278c7
- https://git.alpinelinux.org/aports/commit/?id=a1b0125ba4bfed27de55787fb462438f34f6d51f
- https://git.alpinelinux.org/aports/commit/?id=03383fc4a15bcefe41c79e58cabf62f2bb52e006