openEuler update for postgresql



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-32028
CWE-ID CWE-401
Exploitation vector Network
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

postgresql-debugsource
Operating systems & Components / Operating system package or component

postgresql-plpython3
Operating systems & Components / Operating system package or component

postgresql-server
Operating systems & Components / Operating system package or component

postgresql-test-rpm-macros
Operating systems & Components / Operating system package or component

postgresql-pltcl
Operating systems & Components / Operating system package or component

postgresql-help
Operating systems & Components / Operating system package or component

postgresql-devel
Operating systems & Components / Operating system package or component

postgresql-debuginfo
Operating systems & Components / Operating system package or component

postgresql-test
Operating systems & Components / Operating system package or component

postgresql-libs
Operating systems & Components / Operating system package or component

postgresql-plperl
Operating systems & Components / Operating system package or component

postgresql-contrib
Operating systems & Components / Operating system package or component

postgresql-static
Operating systems & Components / Operating system package or component

postgresql
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Memory leak

EUVDB-ID: #VU53232

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-32028

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote user to gain access to sensitive information.

The vulnerability exists due memory leak within the INSERT ... ON CONFLICT ... DO UPDATE command implementation. A remote authenticated database user can execute the affected command to read arbitrary bytes of server memory. In the default configuration, any authenticated database user can create prerequisite objects and complete this attack at will.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 20.03 LTS SP1 - 20.03 LTS SP2

postgresql-debugsource: before 10.5-22

postgresql-plpython3: before 10.5-22

postgresql-server: before 10.5-22

postgresql-test-rpm-macros: before 10.5-22

postgresql-pltcl: before 10.5-22

postgresql-help: before 10.5-22

postgresql-devel: before 10.5-22

postgresql-debuginfo: before 10.5-22

postgresql-test: before 10.5-22

postgresql-libs: before 10.5-22

postgresql-plperl: before 10.5-22

postgresql-contrib: before 10.5-22

postgresql-static: before 10.5-22

postgresql: before 10.5-22

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###