Bug 54056 - postgresql-11: Multiple issues (5.0)
postgresql-11: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-0-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-11-15 08:10 CET by Quality Assurance
Modified: 2021-11-17 16:47 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2021-11-15 08:10:57 CET
New Debian postgresql-11 11.14-0+deb10u1 fixes:
This update addresses the following issues:
* postgresql-11 (CVE-2021-23214)
* postgresql-11 (CVE-2021-23222)
Comment 1 Quality Assurance univentionstaff 2021-11-15 09:01:37 CET
--- mirror/ftp/pool/main/p/postgresql-11/postgresql-11_11.13-0+deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-0/source/postgresql-11_11.14-0+deb10u1.dsc
@@ -1,3 +1,29 @@
+11.14-0+deb10u1 [Thu, 11 Nov 2021 12:53:26 +0100] Christoph Berg <myon@debian.org>:
+
+  * New upstream security release.
+
+    + Make the server and libpq reject extraneous data after an SSL or GSS
+      encryption handshake (Tom Lane)
+
+      A man-in-the-middle with the ability to inject data into the TCP
+      connection could stuff some cleartext data into the start of a
+      supposedly encryption-protected database session.
+
+      This could be abused to send faked SQL commands to the server, although
+      that would only work if the server did not demand any authentication
+      data.  (However, a server relying on SSL certificate authentication
+      might well not do so.) (CVE-2021-23214)
+
+      This could probably be abused to inject faked responses to the client's
+      first few queries, although other details of libpq's behavior make that
+      harder than it sounds.  A different line of attack is to exfiltrate the
+      client's password, or other sensitive data that might be sent early in
+      the session.  That has been shown to be possible with a server
+      vulnerable to CVE-2021-23214. (CVE-2021-23222)
+
+      The PostgreSQL Project thanks Jacob Champion for reporting these
+      problems.
+
 11.13-0+deb10u1 [Thu, 26 Aug 2021 14:55:09 +0200] Christoph Berg <myon@debian.org>:
 
   * New upstream version.

<http://piuparts.knut.univention.de/5.0-0/#8089909201605223953>
Comment 2 Philipp Hahn univentionstaff 2021-11-15 15:44:28 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.0-0] cb3d4d9ba6 Bug #54056: postgresql-11 11.14-0+deb10u1
 doc/errata/staging/postgresql-11.yaml | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

[5.0-0] 10a6b0af5a Bug #54056: postgresql-11 11.14-0+deb10u1
 doc/errata/staging/postgresql-11.yaml | 14 ++++++++++++++
 1 file changed, 14 insertions(+)