CVE-2017-15098

Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:14

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101781 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101781 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039752 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039752 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:2511 - () https://access.redhat.com/errata/RHSA-2018:2511 -
References () https://access.redhat.com/errata/RHSA-2018:2566 - () https://access.redhat.com/errata/RHSA-2018:2566 -
References () https://www.debian.org/security/2017/dsa-4027 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2017/dsa-4027 - Issue Tracking, Third Party Advisory
References () https://www.debian.org/security/2017/dsa-4028 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2017/dsa-4028 - Issue Tracking, Third Party Advisory
References () https://www.postgresql.org/about/news/1801/ - Issue Tracking, Vendor Advisory () https://www.postgresql.org/about/news/1801/ - Issue Tracking, Vendor Advisory
References () https://www.postgresql.org/support/security/ - Issue Tracking, Vendor Advisory () https://www.postgresql.org/support/security/ - Issue Tracking, Vendor Advisory

Information

Published : 2017-11-22 17:29

Updated : 2024-11-21 03:14


NVD link : CVE-2017-15098

Mitre link : CVE-2017-15098

CVE.ORG link : CVE-2017-15098


JSON object : View

Products Affected

debian

  • debian_linux

postgresql

  • postgresql
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor