-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5196-1
security@debian.org https://www.debian.org/security/ Markus Koschany
July 31, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libpgjava
CVE ID : CVE-2020-13692 CVE-2022-21724 CVE-2022-26520
Debian Bug : 962828
Several security vulnerabilities have been found in libpgjava, the official PostgreSQL JDBC Driver.
CVE-2020-13692
An XML External Entity (XXE) weakness was found in PostgreSQL JDBC.
CVE-2022-21724
The JDBC driver did not verify if certain classes implemented the expected
interface before instantiating the class. This can lead to code execution
loaded via arbitrary classes.
CVE-2022-26520
An attacker (who controls the jdbc URL or properties) can call
java.util.logging.FileHandler to write to arbitrary files through the
loggerFile and loggerLevel connection properties.
For the oldstable distribution (buster), these problems have been fixed
in version 42.2.5-2+deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 42.2.15-1+deb11u1.
We recommend that you upgrade your libpgjava packages.
For the detailed security status of libpgjava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libpgjava
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmLmZZpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeSi7w//Qnwdf9jI7xXe5fuEvDO0nOJogwAaUobZMMZ1vE6Og7GSMoZzBM/EvMKF +uqX1/TzwQt2/a58CR8JamaVChO4Ss0bL/9q5zPtWSg3KE07vSSPRg9I5/PBMvSA bkz3OlhY3Fyu7KEDvF1UOKVKXZROU1ZmIjmxTpiScyY8ZH/jtWm+09LgSyP8Sx6M 7zqDJdXc9RElovM9QNc8MpsSgEtDJ71ulsv5AU5BWe3yign7bTW/MP3Pwx9wSZOV XNhe+QKO2jwyE4hrFyUmYcnTv3hjYet1DlmukHiLpADoPrxUNzyLxzW976xMNTnU qFBejjZ6WK55VB5AspO5VwM3XS4sb73v/G/Wk8bRD6vATmn0BVuXg/eZ6pD8yDX7 tNb7Y4mLtJskL4HG+X1MK0bPRnJW9M7CFiFrwQnPv4Upczdj2Qv65GKD+1HdHSlH 4CPufM9Klz7cLQSpyDqBcp8QxLmo6QxrWMuqlB7Y06KUbsp/5il3pYFVEOWsIoAt 22kvORrUIUX9GXw3kyK40jFShPatI90kXbTOG92jX65wZzO+Bwo6lHC0YcwDUXgn 4lO0gOZ9ZWO54uuO1arPLMChcsZcgXamCJl+mTgPINlsJ9glR39gcvgAun21xmgo dRV1QHhK2j2dm1Mg4AoTh6KX+ysMKMfryk7Hr9buJhjL2+OwzBQ=
=vxnG
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)