Vulnerability Description
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 9.0 |
| Postgresql | Postgresql | >= 9.5.0, < 9.5.14 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/105052Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041446Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:2511Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2565Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2566Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:3816Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10925Issue TrackingPatchThird Party Advisory
- https://security.gentoo.org/glsa/201810-08Third Party Advisory
- https://usn.ubuntu.com/3744-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4269Third Party Advisory
- https://www.postgresql.org/about/news/1878/Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/105052Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041446Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-10925?
CVE-2018-10925 is a vulnerability with a CVSS score of 8.1 (HIGH). It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE"...
How severe is CVE-2018-10925?
CVE-2018-10925 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10925?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Postgresql Postgresql.