Описание
Security update for postgresql10
This update for postgresql10 fixes the following issues:
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Список пакетов
openSUSE Leap 15.2
postgresql10-10.19-lp152.2.27.1
postgresql10-contrib-10.19-lp152.2.27.1
postgresql10-devel-10.19-lp152.2.27.1
postgresql10-docs-10.19-lp152.2.27.1
postgresql10-plperl-10.19-lp152.2.27.1
postgresql10-plpython-10.19-lp152.2.27.1
postgresql10-pltcl-10.19-lp152.2.27.1
postgresql10-server-10.19-lp152.2.27.1
postgresql10-test-10.19-lp152.2.27.1
Ссылки
- E-Mail link for openSUSE-SU-2021:1584-1
- SUSE Security Ratings
- SUSE Bug 1192516
- SUSE CVE CVE-2021-23214 page
- SUSE CVE CVE-2021-23222 page
Описание
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
Затронутые продукты
openSUSE Leap 15.2:postgresql10-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-contrib-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-devel-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-docs-10.19-lp152.2.27.1
Ссылки
- CVE-2021-23214
- SUSE Bug 1192516
Описание
A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption.
Затронутые продукты
openSUSE Leap 15.2:postgresql10-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-contrib-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-devel-10.19-lp152.2.27.1
openSUSE Leap 15.2:postgresql10-docs-10.19-lp152.2.27.1
Ссылки
- CVE-2021-23222
- SUSE Bug 1192516