USN-3390-1: PostgreSQL vulnerabilities

Ubuntu Security Notice USN-3390-1

15th August, 2017

postgresql-9.3, postgresql-9.5, postgresql-9.6 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 17.04
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS


Several security issues were fixed in PostgreSQL.

Software description

  • postgresql-9.3 - Object-relational SQL database
  • postgresql-9.5 - Object-relational SQL database
  • postgresql-9.6 - object-relational SQL database


Ben de Graaff, Jelte Fennema, and Jeroen van der Ham discovered that
PostgreSQL allowed the use of empty passwords in some authentication
methods, contrary to expected behaviour. A remote attacker could use an
empty password to authenticate to servers that were believed to have
password login disabled. (CVE-2017-7546)

Jeff Janes discovered that PostgreSQL incorrectly handled the
pg_user_mappings catalog view. A remote attacker without server privileges
could possibly use this issue to obtain certain passwords. (CVE-2017-7547)

Chapman Flack discovered that PostgreSQL incorrectly handled lo_put()
permissions. A remote attacker could possibly use this issue to change the
data in a large object. (CVE-2017-7548)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 17.04:
postgresql-9.6 9.6.4-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
postgresql-9.5 9.5.8-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
postgresql-9.3 9.3.18-0ubuntu0.14.04.1

To update your system, please follow these instructions:

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.


CVE-2017-7546, CVE-2017-7547, CVE-2017-7548