OESA-2025-2104

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2104
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2104.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2104
Upstream
Published
2025-09-05T12:39:49Z
Modified
2025-09-05T13:18:07.856190Z
Summary
postgresql-13 security update
Details

PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.

Security Fix(es):

PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.(CVE-2025-8713)

Untrusted data inclusion in pgdump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pgdumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.(CVE-2025-8714)

Improper neutralization of newlines in pgdump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pgdumpall, pgrestore, and pgupgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.(CVE-2025-8715)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / postgresql-13

Package

Name
postgresql-13
Purl
pkg:rpm/openEuler/postgresql-13&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
13.22-1.oe2003sp4

Ecosystem specific

{
    "src": [
        "postgresql-13-13.22-1.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "postgresql-13-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-contrib-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-debuginfo-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-debugsource-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-docs-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-llvmjit-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-plperl-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-plpython3-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-pltcl-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-private-devel-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-private-libs-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-server-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-server-devel-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-static-13.22-1.oe2003sp4.x86_64.rpm",
        "postgresql-13-test-13.22-1.oe2003sp4.x86_64.rpm"
    ],
    "noarch": [
        "postgresql-13-test-rpm-macros-13.22-1.oe2003sp4.noarch.rpm"
    ],
    "aarch64": [
        "postgresql-13-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-contrib-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-debuginfo-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-debugsource-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-docs-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-llvmjit-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-plperl-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-plpython3-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-pltcl-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-private-devel-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-private-libs-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-server-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-server-devel-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-static-13.22-1.oe2003sp4.aarch64.rpm",
        "postgresql-13-test-13.22-1.oe2003sp4.aarch64.rpm"
    ]
}