[SECURITY] [DSA 5196-1] libpgjava security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5196-1 security@debian.org
https://www.debian.org/security/ Markus Koschany
July 31, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libpgjava
CVE ID : CVE-2020-13692 CVE-2022-21724 CVE-2022-26520
Debian Bug : 962828
Several security vulnerabilities have been found in libpgjava, the official
PostgreSQL JDBC Driver.
CVE-2020-13692
An XML External Entity (XXE) weakness was found in PostgreSQL JDBC.
CVE-2022-21724
The JDBC driver did not verify if certain classes implemented the expected
interface before instantiating the class. This can lead to code execution
loaded via arbitrary classes.
CVE-2022-26520
An attacker (who controls the jdbc URL or properties) can call
java.util.logging.FileHandler to write to arbitrary files through the
loggerFile and loggerLevel connection properties.
For the oldstable distribution (buster), these problems have been fixed
in version 42.2.5-2+deb10u1.
For the stable distribution (bullseye), these problems have been fixed in
version 42.2.15-1+deb11u1.
We recommend that you upgrade your libpgjava packages.
For the detailed security status of libpgjava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libpgjava
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmLmZZpfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7
UeSi7w//Qnwdf9jI7xXe5fuEvDO0nOJogwAaUobZMMZ1vE6Og7GSMoZzBM/EvMKF
+uqX1/TzwQt2/a58CR8JamaVChO4Ss0bL/9q5zPtWSg3KE07vSSPRg9I5/PBMvSA
bkz3OlhY3Fyu7KEDvF1UOKVKXZROU1ZmIjmxTpiScyY8ZH/jtWm+09LgSyP8Sx6M
7zqDJdXc9RElovM9QNc8MpsSgEtDJ71ulsv5AU5BWe3yign7bTW/MP3Pwx9wSZOV
XNhe+QKO2jwyE4hrFyUmYcnTv3hjYet1DlmukHiLpADoPrxUNzyLxzW976xMNTnU
qFBejjZ6WK55VB5AspO5VwM3XS4sb73v/G/Wk8bRD6vATmn0BVuXg/eZ6pD8yDX7
tNb7Y4mLtJskL4HG+X1MK0bPRnJW9M7CFiFrwQnPv4Upczdj2Qv65GKD+1HdHSlH
4CPufM9Klz7cLQSpyDqBcp8QxLmo6QxrWMuqlB7Y06KUbsp/5il3pYFVEOWsIoAt
22kvORrUIUX9GXw3kyK40jFShPatI90kXbTOG92jX65wZzO+Bwo6lHC0YcwDUXgn
4lO0gOZ9ZWO54uuO1arPLMChcsZcgXamCJl+mTgPINlsJ9glR39gcvgAun21xmgo
dRV1QHhK2j2dm1Mg4AoTh6KX+ysMKMfryk7Hr9buJhjL2+OwzBQ=
=vxnG
-----END PGP SIGNATURE-----
Reply to: