Information Exposure Affecting rh-postgresql96-postgresql-pltcl package, versions <0:9.6.10-1.el7


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
11.28% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-RHPOSTGRESQL96POSTGRESQLPLTCL-4772950
  • published1 Nov 2021
  • disclosed9 Nov 2017

Introduced: 9 Nov 2017

CVE-2017-15099  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rh-postgresql96-postgresql-pltcl to version 0:9.6.10-1.el7 or higher.
This issue was patched in RHSA-2018:2566.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rh-postgresql96-postgresql-pltcl package and not the rh-postgresql96-postgresql-pltcl package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.