vulnerability
SUSE: CVE-2018-1115: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:N/I:P/A:P) | May 10, 2018 | Jun 16, 2018 | Oct 22, 2021 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Published
May 10, 2018
Added
Jun 16, 2018
Modified
Oct 22, 2021
Description
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
Solutions
suse-upgrade-libecpg6suse-upgrade-libecpg6-32bitsuse-upgrade-libpq5suse-upgrade-libpq5-32bitsuse-upgrade-postgresqlsuse-upgrade-postgresql-contribsuse-upgrade-postgresql-develsuse-upgrade-postgresql-docssuse-upgrade-postgresql-llvmjitsuse-upgrade-postgresql-plperlsuse-upgrade-postgresql-plpythonsuse-upgrade-postgresql-pltclsuse-upgrade-postgresql-serversuse-upgrade-postgresql-server-develsuse-upgrade-postgresql-testsuse-upgrade-postgresql10suse-upgrade-postgresql10-contribsuse-upgrade-postgresql10-develsuse-upgrade-postgresql10-docssuse-upgrade-postgresql10-plperlsuse-upgrade-postgresql10-plpythonsuse-upgrade-postgresql10-pltclsuse-upgrade-postgresql10-serversuse-upgrade-postgresql10-testsuse-upgrade-postgresql12suse-upgrade-postgresql12-contribsuse-upgrade-postgresql12-develsuse-upgrade-postgresql12-docssuse-upgrade-postgresql12-llvmjitsuse-upgrade-postgresql12-plperlsuse-upgrade-postgresql12-plpythonsuse-upgrade-postgresql12-pltclsuse-upgrade-postgresql12-serversuse-upgrade-postgresql12-server-develsuse-upgrade-postgresql12-testsuse-upgrade-postgresql96suse-upgrade-postgresql96-contribsuse-upgrade-postgresql96-develsuse-upgrade-postgresql96-docssuse-upgrade-postgresql96-plperlsuse-upgrade-postgresql96-plpythonsuse-upgrade-postgresql96-pltclsuse-upgrade-postgresql96-serversuse-upgrade-postgresql96-test
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.