Debian dla-4273 : libecpg-compat3 - security update

high Nessus Plugin ID 249339

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4273 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4273-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb August 14, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : postgresql-13 Version : 13.22-0+deb11u1 CVE IDs : CVE-2025-8713 CVE-2025-8714 CVE-2025-8715

It was discovered that there were a number of vulnerabilities in postgresql-13, the widely-popular database management system:

* CVE-2025-8713: The fix for CVE-2017-7484 (plus followup fixes), was intended to prevent leaky functions from being applied to statistics data for columns that the calling user does not have permission to read. Some gaps in that protection were found and addressed.

* CVE-2025-8714: Prevent pg_dump scripts from being used to attack the user running the restore. An attacker who had gained superuser-level control over the source server might have been able to cause it to emit text that would be interpreted as psql meta-commands.

* CVE-2025-8715: Convert newlines to spaces in names included in comments in pg_dump output, because names containing newlines offered the ability to inject arbitrary SQL commands into the output script.

For Debian 11 bullseye, these problems have been fixed in version 13.22-0+deb11u1. Thanks to Christoph Berg (myon) for preparing this upload.

We recommend that you upgrade your postgresql-13 packages.

For the detailed security status of postgresql-13 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/postgresql-13

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the libecpg-compat3 packages.

See Also

http://www.nessus.org/u?1964ded4

https://security-tracker.debian.org/tracker/CVE-2017-7484

https://security-tracker.debian.org/tracker/CVE-2025-8713

https://security-tracker.debian.org/tracker/CVE-2025-8714

https://security-tracker.debian.org/tracker/CVE-2025-8715

https://packages.debian.org/source/bullseye/postgresql-13

Plugin Details

Severity: High

ID: 249339

File Name: debian_DLA-4273.nasl

Version: 1.1

Type: local

Agent: unix

Published: 8/14/2025

Updated: 8/14/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2017-7484

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libpq-dev, p-cpe:/a:debian:debian_linux:libecpg-dev, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:postgresql-13, p-cpe:/a:debian:debian_linux:postgresql-pltcl-13, p-cpe:/a:debian:debian_linux:libecpg6, p-cpe:/a:debian:debian_linux:postgresql-server-dev-13, p-cpe:/a:debian:debian_linux:libecpg-compat3, p-cpe:/a:debian:debian_linux:postgresql-plperl-13, p-cpe:/a:debian:debian_linux:postgresql-plpython3-13, p-cpe:/a:debian:debian_linux:postgresql-doc-13, p-cpe:/a:debian:debian_linux:libpgtypes3, p-cpe:/a:debian:debian_linux:libpq5, p-cpe:/a:debian:debian_linux:postgresql-client-13

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 8/14/2025

Vulnerability Publication Date: 5/11/2017

Reference Information

CVE: CVE-2017-7484, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715