Back to postgresql-12 PTS page

Accepted postgresql-12 12.4-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 11 Aug 2020 12:07:26 +0200
Source: postgresql-12
Architecture: source
Version: 12.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org>
Changed-By: Christoph Berg <myon@debian.org>
Changes:
 postgresql-12 (12.4-1) unstable; urgency=medium
 .
   * New upstream version.
     + Set a secure search_path in logical replication walsenders and apply
       workers (Noah Misch)
 .
       A malicious user of either the publisher or subscriber database could
       potentially cause execution of arbitrary SQL code by the role running
       replication, which is often a superuser.  Some of the risks here are
       equivalent to those described in CVE-2018-1058, and are mitigated in
       this patch by ensuring that the replication sender and receiver execute
       with empty search_path settings. (As with CVE-2018-1058, that change
       might cause problems for under-qualified names used in replicated
       tables' DDL.)  Other risks are inherent in replicating objects that
       belong to untrusted roles; the most we can do is document that there is
       a hazard to consider. (CVE-2020-14349)
 .
     + Make contrib modules' installation scripts more secure (Tom Lane)
 .
       Attacks similar to those described in CVE-2018-1058 could be carried out
       against an extension installation script, if the attacker can create
       objects in either the extension's target schema or the schema of some
       prerequisite extension.  Since extensions often require superuser
       privilege to install, this can open a path to obtaining superuser
       privilege.  To mitigate this risk, be more careful about the search_path
       used to run an installation script; disable check_function_bodies within
       the script; and fix catalog-adjustment queries used in some contrib
       modules to ensure they are secure.  Also provide documentation to help
       third-party extension authors make their installation scripts secure.
       This is not a complete solution; extensions that depend on other
       extensions can still be at risk if installed carelessly.
       (CVE-2020-14350)
 .
   * DH 13.
Checksums-Sha1:
 76afbe79eaedaa2f375d2a4610fd8fa58e6d0758 3627 postgresql-12_12.4-1.dsc
 5a64e3916a42547227f2afec359d1c9ddc3eba8e 20669776 postgresql-12_12.4.orig.tar.bz2
 8aa3e4ef495be5c487ae705ba1f05abb7a73175d 23736 postgresql-12_12.4-1.debian.tar.xz
Checksums-Sha256:
 483e2c17b982240256bdd5812b3ed0669c5017e4be645423e0bbb409fb759d6f 3627 postgresql-12_12.4-1.dsc
 bee93fbe2c32f59419cb162bcc0145c58da9a8644ee154a30b9a5ce47de606cc 20669776 postgresql-12_12.4.orig.tar.bz2
 525e1a0bc8f14cf5a437f1c8775be501c6490f8c55a45d9b87f905cfd6d5c87b 23736 postgresql-12_12.4-1.debian.tar.xz
Files:
 1e28f7dd5d157336dbcbba77cd42912a 3627 database optional postgresql-12_12.4-1.dsc
 80ebbf0e55193b123760e5f8e48c6cff 20669776 database optional postgresql-12_12.4.orig.tar.bz2
 50e330d3d91c9795cf11aa154ecce1d1 23736 database optional postgresql-12_12.4-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=VmYw
-----END PGP SIGNATURE-----