{"schema_version":"1.7.2","id":"OESA-2022-1598","modified":"2022-03-26T11:03:40Z","published":"2022-03-26T11:03:40Z","upstream":["CVE-2021-23214","CVE-2021-23222"],"summary":"postgresql-13 security update","details":"PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you\u0026apos;ll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system.  These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection.  The PostgreSQL server can be found in the postgresql-server sub-package.\r\n\r\nSecurity Fix(es):\r\n\r\nWhen the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.(CVE-2021-23214)\r\n\r\nA man-in-the-middle attacker can inject false responses to the client\u0026apos;s first few queries, despite the use of SSL certificate verification and encryption.(CVE-2021-23222)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"postgresql-13","purl":"pkg:rpm/openEuler/postgresql-13\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.3-2.oe1"}]}],"ecosystem_specific":{"aarch64":["postgresql-13-plperl-13.3-2.oe1.aarch64.rpm","postgresql-13-test-13.3-2.oe1.aarch64.rpm","postgresql-13-llvmjit-13.3-2.oe1.aarch64.rpm","postgresql-13-static-13.3-2.oe1.aarch64.rpm","postgresql-13-debuginfo-13.3-2.oe1.aarch64.rpm","postgresql-13-docs-13.3-2.oe1.aarch64.rpm","postgresql-13-contrib-13.3-2.oe1.aarch64.rpm","postgresql-13-debugsource-13.3-2.oe1.aarch64.rpm","postgresql-13-server-devel-13.3-2.oe1.aarch64.rpm","postgresql-13-plpython3-13.3-2.oe1.aarch64.rpm","postgresql-13-13.3-2.oe1.aarch64.rpm","postgresql-13-pltcl-13.3-2.oe1.aarch64.rpm","postgresql-13-server-13.3-2.oe1.aarch64.rpm"],"noarch":["postgresql-13-test-rpm-macros-13.3-2.oe1.noarch.rpm"],"src":["postgresql-13-13.3-2.oe1.src.rpm"],"x86_64":["postgresql-13-static-13.3-2.oe1.x86_64.rpm","postgresql-13-debuginfo-13.3-2.oe1.x86_64.rpm","postgresql-13-13.3-2.oe1.x86_64.rpm","postgresql-13-docs-13.3-2.oe1.x86_64.rpm","postgresql-13-pltcl-13.3-2.oe1.x86_64.rpm","postgresql-13-plpython3-13.3-2.oe1.x86_64.rpm","postgresql-13-llvmjit-13.3-2.oe1.x86_64.rpm","postgresql-13-contrib-13.3-2.oe1.x86_64.rpm","postgresql-13-test-13.3-2.oe1.x86_64.rpm","postgresql-13-debugsource-13.3-2.oe1.x86_64.rpm","postgresql-13-server-devel-13.3-2.oe1.x86_64.rpm","postgresql-13-server-13.3-2.oe1.x86_64.rpm","postgresql-13-plperl-13.3-2.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP2","name":"postgresql-13","purl":"pkg:rpm/openEuler/postgresql-13\u0026distro=openEuler-20.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.3-2.oe1"}]}],"ecosystem_specific":{"aarch64":["postgresql-13-test-13.3-2.oe1.aarch64.rpm","postgresql-13-debugsource-13.3-2.oe1.aarch64.rpm","postgresql-13-docs-13.3-2.oe1.aarch64.rpm","postgresql-13-server-devel-13.3-2.oe1.aarch64.rpm","postgresql-13-13.3-2.oe1.aarch64.rpm","postgresql-13-contrib-13.3-2.oe1.aarch64.rpm","postgresql-13-debuginfo-13.3-2.oe1.aarch64.rpm","postgresql-13-llvmjit-13.3-2.oe1.aarch64.rpm","postgresql-13-pltcl-13.3-2.oe1.aarch64.rpm","postgresql-13-plperl-13.3-2.oe1.aarch64.rpm","postgresql-13-server-13.3-2.oe1.aarch64.rpm","postgresql-13-plpython3-13.3-2.oe1.aarch64.rpm","postgresql-13-static-13.3-2.oe1.aarch64.rpm"],"noarch":["postgresql-13-test-rpm-macros-13.3-2.oe1.noarch.rpm"],"src":["postgresql-13-13.3-2.oe1.src.rpm"],"x86_64":["postgresql-13-plperl-13.3-2.oe1.x86_64.rpm","postgresql-13-server-13.3-2.oe1.x86_64.rpm","postgresql-13-contrib-13.3-2.oe1.x86_64.rpm","postgresql-13-plpython3-13.3-2.oe1.x86_64.rpm","postgresql-13-debuginfo-13.3-2.oe1.x86_64.rpm","postgresql-13-pltcl-13.3-2.oe1.x86_64.rpm","postgresql-13-test-13.3-2.oe1.x86_64.rpm","postgresql-13-server-devel-13.3-2.oe1.x86_64.rpm","postgresql-13-llvmjit-13.3-2.oe1.x86_64.rpm","postgresql-13-13.3-2.oe1.x86_64.rpm","postgresql-13-static-13.3-2.oe1.x86_64.rpm","postgresql-13-docs-13.3-2.oe1.x86_64.rpm","postgresql-13-debugsource-13.3-2.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"postgresql-13","purl":"pkg:rpm/openEuler/postgresql-13\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.3-2.oe1"}]}],"ecosystem_specific":{"aarch64":["postgresql-13-pltcl-13.3-2.oe1.aarch64.rpm","postgresql-13-13.3-2.oe1.aarch64.rpm","postgresql-13-debuginfo-13.3-2.oe1.aarch64.rpm","postgresql-13-plperl-13.3-2.oe1.aarch64.rpm","postgresql-13-server-devel-13.3-2.oe1.aarch64.rpm","postgresql-13-debugsource-13.3-2.oe1.aarch64.rpm","postgresql-13-static-13.3-2.oe1.aarch64.rpm","postgresql-13-contrib-13.3-2.oe1.aarch64.rpm","postgresql-13-docs-13.3-2.oe1.aarch64.rpm","postgresql-13-test-13.3-2.oe1.aarch64.rpm","postgresql-13-plpython3-13.3-2.oe1.aarch64.rpm","postgresql-13-server-13.3-2.oe1.aarch64.rpm","postgresql-13-llvmjit-13.3-2.oe1.aarch64.rpm"],"noarch":["postgresql-13-test-rpm-macros-13.3-2.oe1.noarch.rpm"],"src":["postgresql-13-13.3-2.oe1.src.rpm"],"x86_64":["postgresql-13-server-devel-13.3-2.oe1.x86_64.rpm","postgresql-13-contrib-13.3-2.oe1.x86_64.rpm","postgresql-13-13.3-2.oe1.x86_64.rpm","postgresql-13-docs-13.3-2.oe1.x86_64.rpm","postgresql-13-test-13.3-2.oe1.x86_64.rpm","postgresql-13-debugsource-13.3-2.oe1.x86_64.rpm","postgresql-13-llvmjit-13.3-2.oe1.x86_64.rpm","postgresql-13-plperl-13.3-2.oe1.x86_64.rpm","postgresql-13-static-13.3-2.oe1.x86_64.rpm","postgresql-13-plpython3-13.3-2.oe1.x86_64.rpm","postgresql-13-debuginfo-13.3-2.oe1.x86_64.rpm","postgresql-13-server-13.3-2.oe1.x86_64.rpm","postgresql-13-pltcl-13.3-2.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1598"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23222"}],"database_specific":{"severity":"High"}}