-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3935-1 security@xxxxxxxxxx https://www.debian.org/security/ Moritz Muehlenhoff August 10, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : postgresql-9.4 CVE ID : CVE-2017-7546 CVE-2017-7547 CVE-2017-7548 Several vulnerabilities have been found in the PostgreSQL database system: CVE-2017-7546 In some authentication methods empty passwords were accepted. CVE-2017-7547 User mappings could leak data to unprivileged users. CVE-2017-7548 The lo_put() function ignored ACLs. For more in-depth descriptions of the security vulnerabilities, please see https://www.postgresql.org/about/news/1772/ For the oldstable distribution (jessie), these problems have been fixed in version 9.4.13-0+deb8u1. We recommend that you upgrade your postgresql-9.4 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlmMyugACgkQEMKTtsN8 Tjbhrw/+OA9HQ3H9S96IkZ3q4qV9EtZofNE2Dc7KMqfZcTb7pDtHs5NJNvjjQbB2 C7qd6FHCZkcm/07Z2eQwS8b6hlMylAAOFlGuy+7J+1wfiIQOJ+B5DgUnwVngvsjC Sl1Oi8f3qfaZitcT1HVus3cVrIzGcZwiZpOeyGtpX83pI5ydFA6kiKYgRh0+pwRe Z6RcRWEOS80VUbpJuJcE6szWqv5TDq9jmuadEYFgY4kypefewnGE7lUZPkrcwsm4 QUz/nxswPthWUTEmpg55pWQDl2BEp/GuaHEetYEAKy/tgBAypWs5rhEYV0F007DS L3u5Cs5yzmSJeUCEHFJ+ovox1DOdRpInn9+B9NXJAUz1cDdPFG7JJbMC4nshigrT rOm0BxR7cQNnUTYl76W1cLRsdsHCyh12sbLJdevEZ48QPX/pQu9vuC0+yqxdbFVe ogUBcWizJ/kJQMBDgBv2AU59H8S/J1jFdKzQ3JMQ81dv/NDDGe7qVaWufQ32RUVS Dx1ft/HAbltqcyPtbNUGCtmb3d5hyLPY69/+jHtWKAGW+/0HFIpCS/CTyYZEikLB hkNj2WpxZdzWnpBS3UeYsvFyxJLWqxDUY6X8QpGZYrb1Y9Vq42BkcQSTbkT3vp4J DxPWZfw/ak/IiAQ6mJkn5CHMZHwXm0hWzmo1BL698cHInh1vaLo= =qCEo -----END PGP SIGNATURE-----