CVE-2021-23214

NameCVE-2021-23214
DescriptionWhen the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2817-1, DSA-5006-1, DSA-5007-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postgresql-11 (PTS)buster11.16-0+deb10u1fixed
buster (security)11.22-0+deb10u2fixed
postgresql-13 (PTS)bullseye13.13-0+deb11u1fixed
bullseye (security)13.14-0+deb11u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postgresql-11sourcebuster11.14-0+deb10u1DSA-5006-1
postgresql-11source(unstable)(unfixed)
postgresql-13sourcebullseye13.5-0+deb11u1DSA-5007-1
postgresql-13source(unstable)(unfixed)
postgresql-14source(unstable)14.1-1
postgresql-9.6sourcestretch9.6.24-0+deb9u1DLA-2817-1
postgresql-9.6source(unstable)(unfixed)

Notes

https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=046c2c846b741a12e7fd61d8d86bf324a20e3dfc (REL9_6_24)

Search for package or bug name: Reporting problems