USN-3390-1: PostgreSQL vulnerabilities

15 August 2017

postgresql-9.3, postgresql-9.5, postgresql-9.6 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS


Several security issues were fixed in PostgreSQL.

Software Description

  • postgresql-9.6 - object-relational SQL database
  • postgresql-9.5 - Object-relational SQL database
  • postgresql-9.3 - Object-relational SQL database


Ben de Graaff, Jelte Fennema, and Jeroen van der Ham discovered that PostgreSQL allowed the use of empty passwords in some authentication methods, contrary to expected behaviour. A remote attacker could use an empty password to authenticate to servers that were believed to have password login disabled. (CVE-2017-7546)

Jeff Janes discovered that PostgreSQL incorrectly handled the pg_user_mappings catalog view. A remote attacker without server privileges could possibly use this issue to obtain certain passwords. (CVE-2017-7547)

Chapman Flack discovered that PostgreSQL incorrectly handled lo_put() permissions. A remote attacker could possibly use this issue to change the data in a large object. (CVE-2017-7548)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 17.04
postgresql-9.6 - 9.6.4-0ubuntu0.17.04.1
Ubuntu 16.04 LTS
postgresql-9.5 - 9.5.8-0ubuntu0.16.04.1
Ubuntu 14.04 LTS
postgresql-9.3 - 9.3.18-0ubuntu0.14.04.1

To update your system, please follow these instructions:

This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart PostgreSQL to make all the necessary changes.