Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02842-1

Опубликовано: 18 авг. 2025
Источник: suse-cvrf

Описание

Security update for postgresql13

This update for postgresql13 fixes the following issues:

Upgrade to 13.22:

  • CVE-2025-8713: optimizer statistics can expose sampled data within a view, partition, or child table (bsc#1248120).
  • CVE-2025-8714: untrusted data inclusion in pg_dump lets superuser of origin server execute arbitrary code in psql client (bsc#1248122).
  • CVE-2025-8715: improper neutralization of newlines in pg_dump allows execution of arbitrary code in psql client and in restore target server (bsc#1248119).

Список пакетов

openSUSE Leap 15.6
postgresql13-13.22-150600.14.11.1
postgresql13-contrib-13.22-150600.14.11.1
postgresql13-devel-13.22-150600.14.11.1
postgresql13-docs-13.22-150600.14.11.1
postgresql13-llvmjit-13.22-150600.14.11.1
postgresql13-llvmjit-devel-13.22-150600.14.11.1
postgresql13-plperl-13.22-150600.14.11.1
postgresql13-plpython-13.22-150600.14.11.1
postgresql13-pltcl-13.22-150600.14.11.1
postgresql13-server-13.22-150600.14.11.1
postgresql13-server-devel-13.22-150600.14.11.1
postgresql13-test-13.22-150600.14.11.1

Описание

PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.


Затронутые продукты
openSUSE Leap 15.6:postgresql13-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-contrib-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-devel-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-docs-13.22-150600.14.11.1

Ссылки

Описание

Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.


Затронутые продукты
openSUSE Leap 15.6:postgresql13-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-contrib-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-devel-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-docs-13.22-150600.14.11.1

Ссылки

Описание

Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.


Затронутые продукты
openSUSE Leap 15.6:postgresql13-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-contrib-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-devel-13.22-150600.14.11.1
openSUSE Leap 15.6:postgresql13-docs-13.22-150600.14.11.1

Ссылки