Debian: DSA-5196-1: libpgjava security update | LinuxSecurity.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5196-1                   [email protected]
https://www.debian.org/security/                          Markus Koschany
July 31, 2022                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libpgjava
CVE ID         : CVE-2020-13692 CVE-2022-21724 CVE-2022-26520
Debian Bug     : 962828

Several security vulnerabilities have been found in libpgjava, the official
PostgreSQL JDBC Driver.

CVE-2020-13692

    An XML External Entity (XXE) weakness was found in PostgreSQL JDBC.

CVE-2022-21724

    The JDBC driver did not verify if certain classes implemented the expected
    interface before instantiating the class. This can lead to code execution
    loaded via arbitrary classes.

CVE-2022-26520

    An attacker (who controls the jdbc URL or properties) can call
    java.util.logging.FileHandler to write to arbitrary files through the
    loggerFile and loggerLevel connection properties.

For the oldstable distribution (buster), these problems have been fixed
in version 42.2.5-2+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 42.2.15-1+deb11u1.

We recommend that you upgrade your libpgjava packages.

For the detailed security status of libpgjava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libpgjava

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5196-1: libpgjava security update

July 31, 2022
Several security vulnerabilities have been found in libpgjava, the official PostgreSQL JDBC Driver

Summary

Several security vulnerabilities have been found in libpgjava, the official
PostgreSQL JDBC Driver.

CVE-2020-13692

An XML External Entity (XXE) weakness was found in PostgreSQL JDBC.

CVE-2022-21724

The JDBC driver did not verify if certain classes implemented the expected
interface before instantiating the class. This can lead to code execution
loaded via arbitrary classes.

CVE-2022-26520

An attacker (who controls the jdbc URL or properties) can call
java.util.logging.FileHandler to write to arbitrary files through the
loggerFile and loggerLevel connection properties.

For the oldstable distribution (buster), these problems have been fixed
in version 42.2.5-2+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 42.2.15-1+deb11u1.

We recommend that you upgrade your libpgjava packages.

For the detailed security status of libpgjava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libpgjava

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
Package : libpgjava
CVE ID : CVE-2020-13692 CVE-2022-21724 CVE-2022-26520
Debian Bug : 962828

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.