Описание
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 10.15-0ubuntu0.18.04.1 |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 10.15-0ubuntu0.18.04.1 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | not-affected | 12.5-0ubuntu0.20.04.1 |
focal | released | 12.5-0ubuntu0.20.04.1 |
groovy | released | 12.5-0ubuntu0.20.10.1 |
hirsute | DNE | |
impish | DNE | |
jammy | DNE | |
kinetic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE | |
kinetic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | deferred | 2019-08-23 |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE | |
kinetic | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | 9.5.24-0ubuntu0.16.04.1 |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE |
Показывать по
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in PostgreSQL versions before 13.1, before 12.5, befo ...
Use of a Broken or Risky Cryptographic Algorithm in PostgreSQL
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3