{"schema_version":"1.7.2","id":"OESA-2022-2061","modified":"2022-11-11T11:04:32Z","published":"2022-11-11T11:04:32Z","upstream":["CVE-2021-23214","CVE-2021-23222"],"summary":"postgresql security update","details":"PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you\u0026apos;ll need to access a PostgreSQL DBMS server.\r\n\r\nSecurity Fix(es):\r\n\r\nWhen the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.(CVE-2021-23214)\r\n\r\nA man-in-the-middle attacker can inject false responses to the client\u0026apos;s first few queries, despite the use of SSL certificate verification and encryption.(CVE-2021-23222)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS","name":"postgresql","purl":"pkg:rpm/openEuler/postgresql\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.3-7.oe2203"}]}],"ecosystem_specific":{"aarch64":["postgresql-13.3-7.oe2203.aarch64.rpm","postgresql-debuginfo-13.3-7.oe2203.aarch64.rpm","postgresql-plpython3-13.3-7.oe2203.aarch64.rpm","postgresql-server-13.3-7.oe2203.aarch64.rpm","postgresql-contrib-13.3-7.oe2203.aarch64.rpm","postgresql-llvmjit-13.3-7.oe2203.aarch64.rpm","postgresql-debugsource-13.3-7.oe2203.aarch64.rpm","postgresql-server-devel-13.3-7.oe2203.aarch64.rpm","postgresql-test-13.3-7.oe2203.aarch64.rpm","postgresql-docs-13.3-7.oe2203.aarch64.rpm","postgresql-plperl-13.3-7.oe2203.aarch64.rpm","postgresql-pltcl-13.3-7.oe2203.aarch64.rpm","postgresql-static-13.3-7.oe2203.aarch64.rpm"],"noarch":["postgresql-test-rpm-macros-13.3-7.oe2203.noarch.rpm"],"src":["postgresql-13.3-7.oe2203.src.rpm"],"x86_64":["postgresql-docs-13.3-7.oe2203.x86_64.rpm","postgresql-plperl-13.3-7.oe2203.x86_64.rpm","postgresql-server-devel-13.3-7.oe2203.x86_64.rpm","postgresql-13.3-7.oe2203.x86_64.rpm","postgresql-pltcl-13.3-7.oe2203.x86_64.rpm","postgresql-debuginfo-13.3-7.oe2203.x86_64.rpm","postgresql-llvmjit-13.3-7.oe2203.x86_64.rpm","postgresql-server-13.3-7.oe2203.x86_64.rpm","postgresql-static-13.3-7.oe2203.x86_64.rpm","postgresql-plpython3-13.3-7.oe2203.x86_64.rpm","postgresql-test-13.3-7.oe2203.x86_64.rpm","postgresql-contrib-13.3-7.oe2203.x86_64.rpm","postgresql-debugsource-13.3-7.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2061"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23222"}],"database_specific":{"severity":"High"}}