[USN-3390-1] PostgreSQL vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Tue Aug 15 17:34:52 UTC 2017

Ubuntu Security Notice USN-3390-1
August 15, 2017

postgresql-9.3, postgresql-9.5, postgresql-9.6 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS


Several security issues were fixed in PostgreSQL.

Software Description:
- postgresql-9.6: object-relational SQL database
- postgresql-9.5: Object-relational SQL database
- postgresql-9.3: Object-relational SQL database


Ben de Graaff, Jelte Fennema, and Jeroen van der Ham discovered that
PostgreSQL allowed the use of empty passwords in some authentication
methods, contrary to expected behaviour. A remote attacker could use an
empty password to authenticate to servers that were believed to have
password login disabled. (CVE-2017-7546)

Jeff Janes discovered that PostgreSQL incorrectly handled the
pg_user_mappings catalog view. A remote attacker without server privileges
could possibly use this issue to obtain certain passwords. (CVE-2017-7547)

Chapman Flack discovered that PostgreSQL incorrectly handled lo_put()
permissions. A remote attacker could possibly use this issue to change the
data in a large object. (CVE-2017-7548)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  postgresql-9.6                  9.6.4-0ubuntu0.17.04.1

Ubuntu 16.04 LTS:
  postgresql-9.5                  9.5.8-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  postgresql-9.3                  9.3.18-0ubuntu0.14.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.

  CVE-2017-7546, CVE-2017-7547, CVE-2017-7548

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20170815/520ae6a8/attachment.sig>

More information about the ubuntu-security-announce mailing list