[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted postgresql-17 17.1-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 12 Nov 2024 14:27:34 +0100
Source: postgresql-17
Architecture: source
Version: 17.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org>
Changed-By: Christoph Berg <myon@debian.org>
Changes:
 postgresql-17 (17.1-1) unstable; urgency=medium
 .
   * New upstream version 17.1.
 .
     + Ensure cached plans are marked as dependent on the calling role when RLS
       applies to a non-top-level table reference (Nathan Bossart)
 .
       If a CTE, subquery, sublink, security invoker view, or coercion
       projection in a query references a table with row-level security
       policies, we neglected to mark the resulting plan as potentially
       dependent on which role is executing it.  This could lead to later query
       executions in the same session using the wrong plan, and then returning
       or hiding rows that should have been hidden or returned instead.
 .
       The PostgreSQL Project thanks Wolfgang Walther for reporting this
       problem. (CVE-2024-10976)
 .
     + Make libpq discard error messages received during SSL or GSS protocol
       negotiation (Jacob Champion)
 .
       An error message received before encryption negotiation is completed
       might have been injected by a man-in-the-middle, rather than being real
       server output.  Reporting it opens the door to various security hazards;
       for example, the message might spoof a query result that a careless user
       could mistake for correct output.  The best answer seems to be to
       discard such data and rely only on libpq's own report of the connection
       failure.
 .
       The PostgreSQL Project thanks Jacob Champion for reporting this problem.
       (CVE-2024-10977)
 .
     + Fix unintended interactions between SET SESSION AUTHORIZATION and SET
       ROLE (Tom Lane)
 .
       The SQL standard mandates that SET SESSION AUTHORIZATION have a
       side-effect of doing SET ROLE NONE.  Our implementation of that was
       flawed, creating more interaction between the two settings than
       intended. Notably, rolling back a transaction that had done SET SESSION
       AUTHORIZATION would revert ROLE to NONE even if that had not been the
       previous state, so that the effective user ID might now be different
       from what it had been before the transaction.  Transiently setting
       session_authorization in a function SET clause had a similar effect. A
       related bug was that if a parallel worker inspected
       current_setting('role'), it saw none even when it should see something
       else.
 .
       The PostgreSQL Project thanks Tom Lane for reporting this problem.
       (CVE-2024-10978)
 .
     + Prevent trusted PL/Perl code from changing environment variables
       (Andrew Dunstan, Noah Misch)
 .
       The ability to manipulate process environment variables such as PATH
       gives an attacker opportunities to execute arbitrary code.  Therefore,
       trusted PLs must not offer the ability to do that.  To fix plperl,
       replace %ENV with a tied hash that rejects any modification attempt with
       a warning. Untrusted plperlu retains the ability to change the
       environment.
 .
       The PostgreSQL Project thanks Coby Abrams for reporting this problem.
       (CVE-2024-10979)
 .
   * Fix psql -l against 9.2 and 9.3.
Checksums-Sha1:
 5e0af2e45590ed82144e2f52fb3a39c21863ae60 4242 postgresql-17_17.1-1.dsc
 ebd99d9d48090d7cd43b1b793b2af99e4b3bbcb7 21410991 postgresql-17_17.1.orig.tar.bz2
 a60981a2ad59e21790c6de8bcab4adc0440ae740 25632 postgresql-17_17.1-1.debian.tar.xz
Checksums-Sha256:
 0f509b9b749c11e2108d279c036afa7a3c65c6b2067bc36ae50f181ecccf82ee 4242 postgresql-17_17.1-1.dsc
 7849db74ef6a8555d0723f87e81539301422fa9c8e9f21cce61fdc14e9199dcd 21410991 postgresql-17_17.1.orig.tar.bz2
 7696f3e97e52eec0c1b44317b9b756a89d3e46dc070ca822b825030d99ffa811 25632 postgresql-17_17.1-1.debian.tar.xz
Files:
 9a7f4d6e8dbaa7f40f2ee49423d3b626 4242 database optional postgresql-17_17.1-1.dsc
 76709047835d82ce1ebf6f1fb8928b02 21410991 database optional postgresql-17_17.1.orig.tar.bz2
 96a42a2194fd7087d797ada372bea983 25632 database optional postgresql-17_17.1-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=F54L
-----END PGP SIGNATURE-----

Attachment: pgpajX_GV4yFI.pgp
Description: PGP signature


Reply to: