摘要:
postgresql security update
安全等级: High
公告ID: KylinSec-SA-2025-2894
发布日期: 2025年9月18日
PostgreSQL is an advanced Object-Relational database management system (DBMS).
The base postgresql package contains the client programs that you'll need to
access a PostgreSQL DBMS server, as well as HTML documentation for the whole
system. These client programs can be located on the same machine as the
PostgreSQL server, or on a remote machine that accesses a PostgreSQL server
over a network connection. The PostgreSQL server can be found in the
postgresql-server sub-package.
Security Fix(es):
PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.(CVE-2025-8713)
Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.(CVE-2025-8714)
Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.(CVE-2025-8715)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-8713 | V6 | postgresql-13 | Fixed |
CVE-2025-8714 | V6 | postgresql-13 | Fixed |
CVE-2025-8715 | V6 | postgresql-13 | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
postgresql-test-rpm-macros | noarch | 15.14-1.ks6 |
postgresql | x86_64 | 15.14-1.ks6 |
postgresql-contrib | x86_64 | 15.14-1.ks6 |
postgresql-docs | x86_64 | 15.14-1.ks6 |
postgresql-llvmjit | x86_64 | 15.14-1.ks6 |
postgresql-plperl | x86_64 | 15.14-1.ks6 |
postgresql-plpython3 | x86_64 | 15.14-1.ks6 |
postgresql-pltcl | x86_64 | 15.14-1.ks6 |
postgresql-private-devel | x86_64 | 15.14-1.ks6 |
postgresql-private-libs | x86_64 | 15.14-1.ks6 |
postgresql-server | x86_64 | 15.14-1.ks6 |
postgresql-server-devel | x86_64 | 15.14-1.ks6 |
postgresql-static | x86_64 | 15.14-1.ks6 |
postgresql-test | x86_64 | 15.14-1.ks6 |
postgresql | aarch64 | 15.14-1.ks6 |
postgresql-contrib | aarch64 | 15.14-1.ks6 |
postgresql-docs | aarch64 | 15.14-1.ks6 |
postgresql-llvmjit | aarch64 | 15.14-1.ks6 |
postgresql-plperl | aarch64 | 15.14-1.ks6 |
postgresql-plpython3 | aarch64 | 15.14-1.ks6 |
postgresql-pltcl | aarch64 | 15.14-1.ks6 |
postgresql-private-devel | aarch64 | 15.14-1.ks6 |
postgresql-private-libs | aarch64 | 15.14-1.ks6 |
postgresql-server | aarch64 | 15.14-1.ks6 |
postgresql-server-devel | aarch64 | 15.14-1.ks6 |
postgresql-static | aarch64 | 15.14-1.ks6 |
postgresql-test | aarch64 | 15.14-1.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名