Many PostgreSQL-provided client applications have options that create additional database connections. Some of those applications reuse only the basic connection parameters (e.g. host, user, port), dropping others. If this drops a security-relevant parameter (e.g. channel_binding, sslmode, requirepeer, gssencmode), the attacker has an otherwise-unavailable opportunity to complete a man-in-the-middle attack or observe cleartext transmission. Affected applications are clusterdb, pg_dump, pg_restore, psql, reindexdb, and vacuumdb. The vulnerability arises only if one invokes an affected client application with a connection string containing a security-relevant parameter. Supported, Vulnerable Versions: 9.5 - 13.
Acknowledgments: Name: Peter Eisentraut
Created mingw-postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897234] Created postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897231] Created postgresql:10/postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897222] Created postgresql:11/postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897228] Created postgresql:12/postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897225] Created postgresql:9.6/postgresql tracking bugs for this issue: Affects: fedora-all [bug 1897219]
Statement: In Red Hat Gluster Storage 3, PostgreSQL (embedded in rhevm-dependencies) was shipped as a part of Red Hat Gluster Storage Console that is no longer supported for use with Red Hat Gluster Storage 3.5. Red Hat Gluster Storage Web Administration is now the recommended monitoring tool for Red Hat Storage Gluster clusters. In Red Hat Virtualization the manager appliance uses a vulnerable version of postgresql. Once a fix has been shipped for RHEL 8 the appliance can consume the fix via a regular yum update.
External References: https://www.postgresql.org/about/news/postgresql-131-125-1110-1015-9620-and-9524-released-2111/
Upstream fixes: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=85c54287af56fe351b53913ea2b81e9d6145f964 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=8e5793ab60bba65ffaa0f2237b39c9580d8972c7 https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=a45bc8a4f6495072bc48ad40a5aa0304979114f7
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5316 https://access.redhat.com/errata/RHSA-2020:5316
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5317 https://access.redhat.com/errata/RHSA-2020:5317
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5401 https://access.redhat.com/errata/RHSA-2020:5401
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-25694
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5567 https://access.redhat.com/errata/RHSA-2020:5567
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5619 https://access.redhat.com/errata/RHSA-2020:5619
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5620 https://access.redhat.com/errata/RHSA-2020:5620
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:5638 https://access.redhat.com/errata/RHSA-2020:5638
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:5661 https://access.redhat.com/errata/RHSA-2020:5661
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:5664 https://access.redhat.com/errata/RHSA-2020:5664
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0057 https://access.redhat.com/errata/RHSA-2021:0057
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0161 https://access.redhat.com/errata/RHSA-2021:0161
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0163 https://access.redhat.com/errata/RHSA-2021:0163
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:0164 https://access.redhat.com/errata/RHSA-2021:0164
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0165 https://access.redhat.com/errata/RHSA-2021:0165
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0166 https://access.redhat.com/errata/RHSA-2021:0166
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:0167 https://access.redhat.com/errata/RHSA-2021:0167
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:1512 https://access.redhat.com/errata/RHSA-2021:1512