Several authentication methods, including the widely-used "md5" method, permit empty passwords. On the client side, libpq will not send an empty password. This may have given a false impression that an empty password was equivalent to disabling the account with respect to authentication methods requiring a password. On the contrary, an attacker could easily authenticate as the user. Supported vulnerable versions: 9.2 - 9.6 Upstream patch: https://github.com/postgres/postgres/commit/d5d46d99ba47f
Acknowledgments: Name: the PostgreSQL project Upstream: Ben de Graaff, Jelte Fennema, Jeroen van der Ham
External References: https://www.postgresql.org/about/news/1772/
Created mingw-postgresql tracking bugs for this issue: Affects: epel-7 [bug 1480282] Affects: fedora-all [bug 1480283] Created postgresql tracking bugs for this issue: Affects: fedora-all [bug 1480284]
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2017:2677 https://access.redhat.com/errata/RHSA-2017:2677
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS Via RHSA-2017:2678 https://access.redhat.com/errata/RHSA-2017:2678
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2728 https://access.redhat.com/errata/RHSA-2017:2728
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:2860 https://access.redhat.com/errata/RHSA-2017:2860
Statement: Red Hat Satellite 5 are is in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.