Lucene search

K
debianDebianDEBIAN:DSA-5196-1:1B171
HistoryJul 31, 2022 - 11:22 a.m.

[SECURITY] [DSA 5196-1] libpgjava security update

2022-07-3111:22:59
lists.debian.org
36

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.1%


Debian Security Advisory DSA-5196-1 [email protected]
https://www.debian.org/security/ Markus Koschany
July 31, 2022 https://www.debian.org/security/faq


Package : libpgjava
CVE ID : CVE-2020-13692 CVE-2022-21724 CVE-2022-26520
Debian Bug : 962828

Several security vulnerabilities have been found in libpgjava, the official
PostgreSQL JDBC Driver.

CVE-2020-13692

An XML External Entity (XXE) weakness was found in PostgreSQL JDBC.

CVE-2022-21724

The JDBC driver did not verify if certain classes implemented the expected
interface before instantiating the class. This can lead to code execution
loaded via arbitrary classes.

CVE-2022-26520

An attacker (who controls the jdbc URL or properties) can call
java.util.logging.FileHandler to write to arbitrary files through the
loggerFile and loggerLevel connection properties.

For the oldstable distribution (buster), these problems have been fixed
in version 42.2.5-2+deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 42.2.15-1+deb11u1.

We recommend that you upgrade your libpgjava packages.

For the detailed security status of libpgjava please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libpgjava

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.1%