vulnerability

Amazon Linux 2023: CVE-2025-8714: Important priority package update for postgresql17 (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Aug 14, 2025
Added
Sep 9, 2025
Modified
Sep 16, 2025

Description

Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.

Solutions

amazon-linux-2023-upgrade-postgresql15amazon-linux-2023-upgrade-postgresql15-contribamazon-linux-2023-upgrade-postgresql15-contrib-debuginfoamazon-linux-2023-upgrade-postgresql15-debuginfoamazon-linux-2023-upgrade-postgresql15-debugsourceamazon-linux-2023-upgrade-postgresql15-docsamazon-linux-2023-upgrade-postgresql15-docs-debuginfoamazon-linux-2023-upgrade-postgresql15-llvmjitamazon-linux-2023-upgrade-postgresql15-llvmjit-debuginfoamazon-linux-2023-upgrade-postgresql15-plperlamazon-linux-2023-upgrade-postgresql15-plperl-debuginfoamazon-linux-2023-upgrade-postgresql15-plpython3amazon-linux-2023-upgrade-postgresql15-plpython3-debuginfoamazon-linux-2023-upgrade-postgresql15-pltclamazon-linux-2023-upgrade-postgresql15-pltcl-debuginfoamazon-linux-2023-upgrade-postgresql15-private-develamazon-linux-2023-upgrade-postgresql15-private-libsamazon-linux-2023-upgrade-postgresql15-private-libs-debuginfoamazon-linux-2023-upgrade-postgresql15-serveramazon-linux-2023-upgrade-postgresql15-server-debuginfoamazon-linux-2023-upgrade-postgresql15-server-develamazon-linux-2023-upgrade-postgresql15-server-devel-debuginfoamazon-linux-2023-upgrade-postgresql15-staticamazon-linux-2023-upgrade-postgresql15-testamazon-linux-2023-upgrade-postgresql15-test-debuginfoamazon-linux-2023-upgrade-postgresql15-test-rpm-macrosamazon-linux-2023-upgrade-postgresql15-upgradeamazon-linux-2023-upgrade-postgresql15-upgrade-debuginfoamazon-linux-2023-upgrade-postgresql15-upgrade-develamazon-linux-2023-upgrade-postgresql15-upgrade-devel-debuginfoamazon-linux-2023-upgrade-postgresql16amazon-linux-2023-upgrade-postgresql16-contribamazon-linux-2023-upgrade-postgresql16-contrib-debuginfoamazon-linux-2023-upgrade-postgresql16-debuginfoamazon-linux-2023-upgrade-postgresql16-debugsourceamazon-linux-2023-upgrade-postgresql16-docsamazon-linux-2023-upgrade-postgresql16-docs-debuginfoamazon-linux-2023-upgrade-postgresql16-llvmjitamazon-linux-2023-upgrade-postgresql16-llvmjit-debuginfoamazon-linux-2023-upgrade-postgresql16-plperlamazon-linux-2023-upgrade-postgresql16-plperl-debuginfoamazon-linux-2023-upgrade-postgresql16-plpython3amazon-linux-2023-upgrade-postgresql16-plpython3-debuginfoamazon-linux-2023-upgrade-postgresql16-pltclamazon-linux-2023-upgrade-postgresql16-pltcl-debuginfoamazon-linux-2023-upgrade-postgresql16-private-develamazon-linux-2023-upgrade-postgresql16-private-libsamazon-linux-2023-upgrade-postgresql16-private-libs-debuginfoamazon-linux-2023-upgrade-postgresql16-serveramazon-linux-2023-upgrade-postgresql16-server-debuginfoamazon-linux-2023-upgrade-postgresql16-server-develamazon-linux-2023-upgrade-postgresql16-server-devel-debuginfoamazon-linux-2023-upgrade-postgresql16-staticamazon-linux-2023-upgrade-postgresql16-testamazon-linux-2023-upgrade-postgresql16-test-debuginfoamazon-linux-2023-upgrade-postgresql16-test-rpm-macrosamazon-linux-2023-upgrade-postgresql16-upgradeamazon-linux-2023-upgrade-postgresql16-upgrade-debuginfoamazon-linux-2023-upgrade-postgresql16-upgrade-develamazon-linux-2023-upgrade-postgresql16-upgrade-devel-debuginfoamazon-linux-2023-upgrade-postgresql17amazon-linux-2023-upgrade-postgresql17-contribamazon-linux-2023-upgrade-postgresql17-contrib-debuginfoamazon-linux-2023-upgrade-postgresql17-debuginfoamazon-linux-2023-upgrade-postgresql17-debugsourceamazon-linux-2023-upgrade-postgresql17-docsamazon-linux-2023-upgrade-postgresql17-docs-debuginfoamazon-linux-2023-upgrade-postgresql17-llvmjitamazon-linux-2023-upgrade-postgresql17-llvmjit-debuginfoamazon-linux-2023-upgrade-postgresql17-plperlamazon-linux-2023-upgrade-postgresql17-plperl-debuginfoamazon-linux-2023-upgrade-postgresql17-plpython3amazon-linux-2023-upgrade-postgresql17-plpython3-debuginfoamazon-linux-2023-upgrade-postgresql17-pltclamazon-linux-2023-upgrade-postgresql17-pltcl-debuginfoamazon-linux-2023-upgrade-postgresql17-private-develamazon-linux-2023-upgrade-postgresql17-private-libsamazon-linux-2023-upgrade-postgresql17-private-libs-debuginfoamazon-linux-2023-upgrade-postgresql17-serveramazon-linux-2023-upgrade-postgresql17-server-debuginfoamazon-linux-2023-upgrade-postgresql17-server-develamazon-linux-2023-upgrade-postgresql17-server-devel-debuginfoamazon-linux-2023-upgrade-postgresql17-staticamazon-linux-2023-upgrade-postgresql17-testamazon-linux-2023-upgrade-postgresql17-test-debuginfoamazon-linux-2023-upgrade-postgresql17-test-rpm-macrosamazon-linux-2023-upgrade-postgresql17-upgradeamazon-linux-2023-upgrade-postgresql17-upgrade-debuginfoamazon-linux-2023-upgrade-postgresql17-upgrade-develamazon-linux-2023-upgrade-postgresql17-upgrade-devel-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.