GLSA-201811-24 : PostgreSQL: SQL injection

Medium Nessus Plugin ID 119319

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-201811-24 (PostgreSQL: SQL injection)

A vulnerability was discovered in PostgreSQL’s pg_upgrade and pg_dump.
Impact :

An attacker, by enticing a user to process a specially crafted trigger definition, can execute arbitrary SQL statements with superuser privileges.
Workaround :

There is no known workaround at this time.

Solution

All PostgreSQL 9.3.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-9.3.25' All PostgreSQL 9.4.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-9.4.20' All PostgreSQL 9.5.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-9.5.15' All PostgreSQL 9.6.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-9.6.11' All PostgreSQL 10.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-10.6' All PostgreSQL 11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=dev-db/postgresql-11.1'

See Also

https://security.gentoo.org/glsa/201811-24

Plugin Details

Severity: Medium

ID: 119319

File Name: gentoo_GLSA-201811-24.nasl

Version: 1.2

Type: local

Published: 2018/12/03

Modified: 2018/12/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:postgresql, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2018/11/30

Reference Information

CVE: CVE-2018-16850

GLSA: 201811-24