[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted postgresql-13 13.22-0+deb11u1 (source) into oldoldstable-security



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 14 Aug 2025 15:59:31 +0200
Source: postgresql-13
Architecture: source
Version: 13.22-0+deb11u1
Distribution: bullseye-security
Urgency: medium
Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org>
Changed-By: Christoph Berg <myon@debian.org>
Changes:
 postgresql-13 (13.22-0+deb11u1) bullseye-security; urgency=medium
 .
   * New upstream version 13.22.
 .
     + Tighten security checks in planner estimation functions (Dean Rasheed)
 .
       The fix for CVE-2017-7484, plus followup fixes, intended to prevent
       leaky functions from being applied to statistics data for columns that
       the calling user does not have permission to read.  Two gaps in that
       protection have been found.  One gap applies to partitioning and
       inheritance hierarchies where RLS policies on the tables should restrict
       access to statistics data, but did not.
 .
       The other gap applies to cases where the query accesses a table via a
       view, and the view owner has permissions to read the underlying table
       but the calling user does not have permissions on the view. The view
       owner's permissions satisfied the security checks, and the leaky
       function would get applied to the underlying table's statistics before
       we check the calling user's permissions on the view.  This has been
       fixed by making security checks on views occur at the start of planning.
       That might cause permissions failures to occur earlier than before.
 .
       The PostgreSQL Project thanks Dean Rasheed for reporting this problem.
       (CVE-2025-8713)
 .
     + Prevent pg_dump scripts from being used to attack the user running the
       restore (Nathan Bossart)
 .
       Since dump/restore operations typically involve running SQL commands as
       superuser, the target database installation must trust the source
       server.  However, it does not follow that the operating system user who
       executes psql to perform the restore should have to trust the source
       server.  The risk here is that an attacker who has gained
       superuser-level control over the source server might be able to cause it
       to emit text that would be interpreted as psql meta-commands. That would
       provide shell-level access to the restoring user's own account,
       independently of access to the target database.
 .
       To provide a positive guarantee that this can't happen, extend psql with
       a \restrict command that prevents execution of further meta-commands,
       and teach pg_dump to issue that before any data coming from the source
       server.
 .
       The PostgreSQL Project thanks Martin Rakhmanov, Matthieu Denais, and
       RyotaK for reporting this problem. (CVE-2025-8714)
 .
     + Convert newlines to spaces in names included in comments in pg_dump
       output (Noah Misch)
 .
       Object names containing newlines offered the ability to inject arbitrary
       SQL commands into the output script.  (Without the preceding fix,
       injection of psql meta-commands would also be possible this way.)
       CVE-2012-0868 fixed this class of problem at the time, but later work
       reintroduced several cases.
 .
       The PostgreSQL Project thanks Noah Misch for reporting this problem.
       (CVE-2025-8715)
Checksums-Sha1:
 3a43265253d6c62920b92ea541ba47dd83a90576 3703 postgresql-13_13.22-0+deb11u1.dsc
 3a5f8f2a4e889c395db905147be40dc1f8192fa4 21783034 postgresql-13_13.22.orig.tar.bz2
 7cfa7435ea5a0cece03bab100de55a9504d5ae8e 37104 postgresql-13_13.22-0+deb11u1.debian.tar.xz
Checksums-Sha256:
 a6aad4fc2ec260c82f125ed74318eab7c11a6f43f0cecfbc57632a6ce90cc9d0 3703 postgresql-13_13.22-0+deb11u1.dsc
 d36d83dc89e625502cf6fb1d0529642ba1266bd614b4e4a41cefd1dddcf09080 21783034 postgresql-13_13.22.orig.tar.bz2
 d2269efab97ddcb8b56e130bd0993cfedcfec2d23197347d8ca16ed407ce5ef7 37104 postgresql-13_13.22-0+deb11u1.debian.tar.xz
Files:
 eff9158b4ed7af15792d166f4b621eb4 3703 database optional postgresql-13_13.22-0+deb11u1.dsc
 a00f4df54a13d230d3b3694f75e0f28b 21783034 database optional postgresql-13_13.22.orig.tar.bz2
 717ec23990749f93a8f4b6c2638731fa 37104 database optional postgresql-13_13.22-0+deb11u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=CBup
-----END PGP SIGNATURE-----

Attachment: pgprkyMtgwbKG.pgp
Description: PGP signature


Reply to: