Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Nov 2021 14:49:14 GMT
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: adbbf5c3042b - main - security-vuxml: Add URL for PostgreSQL release notes
Message-ID:  <202111111449.1ABEnEqa073696@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by girgen:

URL: https://cgit.FreeBSD.org/ports/commit/?id=adbbf5c3042bd30ee8b1b777093b0146f0d8d186

commit adbbf5c3042bd30ee8b1b777093b0146f0d8d186
Author:     Palle Girgensohn <girgen@FreeBSD.org>
AuthorDate: 2021-11-11 14:45:28 +0000
Commit:     Palle Girgensohn <girgen@FreeBSD.org>
CommitDate: 2021-11-11 14:45:28 +0000

    security-vuxml: Add URL for PostgreSQL release notes
---
 security/vuxml/vuln-2021.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 6622853e0a1e..2cb2751586d1 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -29,7 +29,7 @@
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>The PostgreSQL Project reports:</p>
-	<blockquote cite="INSERT URL HERE">
+	<blockquote cite="https://www.postgresql.org/about/news/postgresql-141-135-129-1114-1019-and-9624-released-2349/">;
 	  <p> CVE-2021-23214: A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session. This could be abused to send faked SQL commands to the server, although that would only work if the server did not demand any authentication data. (However, a server relying on SSL certificate authentication might well not do so.) </p>
 	  <p> CVE-2021-23222: A man-in-the-middle with the ability to inject data into the TCP connection could stuff some cleartext data into the start of a supposedly encryption-protected database session.  This could probably be abused to inject faked responses to the client's first few queries, although other details of libpq's behavior make that harder than it sounds.  A different line of attack is to exfiltrate the client's password, or other sensitive data that might be sent early in the session.  That has been shown to be possible with a server vulnerable to CVE-2021-23214. </p>
 	</blockquote>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202111111449.1ABEnEqa073696>