{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql13":"13.22-150600.14.11.1","postgresql13-contrib":"13.22-150600.14.11.1","postgresql13-devel":"13.22-150600.14.11.1","postgresql13-docs":"13.22-150600.14.11.1","postgresql13-llvmjit":"13.22-150600.14.11.1","postgresql13-llvmjit-devel":"13.22-150600.14.11.1","postgresql13-plperl":"13.22-150600.14.11.1","postgresql13-plpython":"13.22-150600.14.11.1","postgresql13-pltcl":"13.22-150600.14.11.1","postgresql13-server":"13.22-150600.14.11.1","postgresql13-server-devel":"13.22-150600.14.11.1","postgresql13-test":"13.22-150600.14.11.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"postgresql13","purl":"pkg:rpm/opensuse/postgresql13&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"13.22-150600.14.11.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql13 fixes the following issues:\n\nUpgrade to 13.22:\n  \n- CVE-2025-8713: optimizer statistics can expose sampled data within a view, partition, or child table (bsc#1248120).\n- CVE-2025-8714: untrusted data inclusion in `pg_dump` lets superuser of origin server execute arbitrary code in psql\n  client (bsc#1248122).\n- CVE-2025-8715: improper neutralization of newlines in `pg_dump` allows execution of arbitrary code in psql client and\n  in restore target server (bsc#1248119).\n","id":"SUSE-SU-2025:02842-1","modified":"2025-08-18T12:33:29Z","published":"2025-08-18T12:33:29Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502842-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248120"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248122"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-8713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-8714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-8715"}],"related":["CVE-2025-8713","CVE-2025-8714","CVE-2025-8715"],"summary":"Security update for postgresql13","upstream":["CVE-2025-8713","CVE-2025-8714","CVE-2025-8715"]}