Back to postgresql-9.6 PTS page

Accepted postgresql-9.6 9.6.20-0+deb9u1 (source) into oldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 01 Dec 2020 12:11:51 +0100
Source: postgresql-9.6
Binary: libpq-dev libpq5 libecpg6 libecpg-dev libecpg-compat3 libpgtypes3 postgresql-9.6 postgresql-9.6-dbg postgresql-client-9.6 postgresql-server-dev-9.6 postgresql-doc-9.6 postgresql-contrib-9.6 postgresql-plperl-9.6 postgresql-plpython-9.6 postgresql-plpython3-9.6 postgresql-pltcl-9.6
Architecture: source
Version: 9.6.20-0+deb9u1
Distribution: stretch-security
Urgency: medium
Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org>
Changed-By: Christoph Berg <myon@debian.org>
Description:
 libecpg-compat3 - older version of run-time library for ECPG programs
 libecpg-dev - development files for ECPG (Embedded PostgreSQL for C)
 libecpg6   - run-time library for ECPG programs
 libpgtypes3 - shared library libpgtypes for PostgreSQL 9.6
 libpq-dev  - header files for libpq5 (PostgreSQL library)
 libpq5     - PostgreSQL C client library
 postgresql-9.6 - object-relational SQL database, version 9.6 server
 postgresql-9.6-dbg - debug symbols for postgresql-9.6
 postgresql-client-9.6 - front-end programs for PostgreSQL 9.6
 postgresql-contrib-9.6 - additional facilities for PostgreSQL
 postgresql-doc-9.6 - documentation for the PostgreSQL database management system
 postgresql-plperl-9.6 - PL/Perl procedural language for PostgreSQL 9.6
 postgresql-plpython-9.6 - PL/Python procedural language for PostgreSQL 9.6
 postgresql-plpython3-9.6 - PL/Python 3 procedural language for PostgreSQL 9.6
 postgresql-pltcl-9.6 - PL/Tcl procedural language for PostgreSQL 9.6
 postgresql-server-dev-9.6 - development files for PostgreSQL 9.6 server-side programming
Closes: 974063
Changes:
 postgresql-9.6 (9.6.20-0+deb9u1) stretch-security; urgency=medium
 .
   * New upstream version.
     + Fixes timetz regression test failures. (Closes: #974063)
 .
     + Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers
       within index expressions and materialized view queries (Noah Misch)
 .
       This is essentially a leak in the security restricted operation sandbox
       mechanism.  An attacker having permission to create non-temporary SQL
       objects could parlay this leak to execute arbitrary SQL code as a
       superuser.
 .
       The PostgreSQL Project thanks Etienne Stalmans for reporting this
       problem. (CVE-2020-25695)
 .
     + Fix usage of complex connection-string parameters in pg_dump,
       pg_restore, clusterdb, reindexdb, and vacuumdb (Tom Lane)
 .
       The -d parameter of pg_dump and pg_restore, or the --maintenance-db
       parameter of the other programs mentioned, can be a connection string
       containing multiple connection parameters rather than just a database
       name.  In cases where these programs need to initiate additional
       connections, such as parallel processing or processing of multiple
       databases, the connection string was forgotten and just the basic
       connection parameters (database name, host, port, and username) were
       used for the additional connections.  This could lead to connection
       failures if the connection string included any other essential
       information, such as non-default SSL or GSS parameters. Worse, the
       connection might succeed but not be encrypted as intended, or be
       vulnerable to man-in-the-middle attacks that the intended connection
       parameters would have prevented. (CVE-2020-25694)
 .
     + When psql's \connect command re-uses connection parameters, ensure that
       all non-overridden parameters from a previous connection string are
       re-used (Tom Lane)
 .
       This avoids cases where reconnection might fail due to omission of
       relevant parameters, such as non-default SSL or GSS options. Worse, the
       reconnection might succeed but not be encrypted as intended, or be
       vulnerable to man-in-the-middle attacks that the intended connection
       parameters would have prevented. This is largely the same problem as
       just cited for pg_dump et al, although psql's behavior is more complex
       since the user may intentionally override some connection parameters.
       (CVE-2020-25694)
 .
     + Prevent psql's \gset command from modifying specially-treated variables
       (Noah Misch)
 .
       \gset without a prefix would overwrite whatever variables the server
       told it to.  Thus, a compromised server could set specially-treated
       variables such as PROMPT1, giving the ability to execute arbitrary shell
       code in the user's session.
 .
       The PostgreSQL Project thanks Nick Cleaton for reporting this problem.
       (CVE-2020-25696)
Checksums-Sha1:
 4f02f68591ef4abb7486a401b7d43dc50026bb61 3701 postgresql-9.6_9.6.20-0+deb9u1.dsc
 13aa206da020a550e56dbf524ca227bc2191fa48 18944478 postgresql-9.6_9.6.20.orig.tar.bz2
 85a1c2e144c990100bcec3219c81f389cf465a8e 177896 postgresql-9.6_9.6.20-0+deb9u1.debian.tar.xz
Checksums-Sha256:
 587f13783bf63e7d02d7753014f2fed9107e6027c49dfa82bcb9f9b56353455a 3701 postgresql-9.6_9.6.20-0+deb9u1.dsc
 3d08cba409d45ab62d42b24431a0d55e7537bcd1db2d979f5f2eefe34d487bb6 18944478 postgresql-9.6_9.6.20.orig.tar.bz2
 e2284c1def58fc13f2a4fde2d105beec80c4d71dc94aee262b99d858a04b5d32 177896 postgresql-9.6_9.6.20-0+deb9u1.debian.tar.xz
Files:
 4acac74202fb195e07769bc4f2f81449 3701 database optional postgresql-9.6_9.6.20-0+deb9u1.dsc
 652f2c5eb1a3b0368000717a0e7c36f0 18944478 database optional postgresql-9.6_9.6.20.orig.tar.bz2
 0e0689f8fe3df6a3da133de0fc572c0c 177896 database optional postgresql-9.6_9.6.20-0+deb9u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEXEj+YVf0kXlZcIfGTFprqxLSp64FAl/GLKUACgkQTFprqxLS
p67ejA//ZEW8tv487vxhpZDnS8hdDakIc49DT71s9WaorbyChy67/LnKx5JfVvJo
9FG7YHgciFzw+pLUnaNv19N6iP81RSNiNUeYFhllkdTNLqqxrgP5nw3abZWece9v
K15FYyR0e+U+9rW0gCbnrvRJfrIj9agFoxW6Wo+raZQJb3bUOR+d0tiTAkIlYNFK
vsmvqs1oykrwg2ctDWPk7wG2bxQUeMuMoJC5D0dBkEaqy64dLbBweLMnU17lcUHh
bMwCRP/q78NfCvpAwo8GpfZ5/SqOR5LhNZN+OnlHwAOPq9ElPFAnfkCn+38Tk781
sDpFnJw3rFHUen6SSjZ9uvoSYnBYtx3bq9txlmSfqd7QL7eQtCp9PpaouSqiX+71
J9Oa+p+H7/JgPAqNa7jMMO0w8WgboL+OB/w3hKqaGSwA4ws9CvuHILLfvdQ31hTI
RimdYk6qZUdn5xwHOdZwhdVg0BUDlDG7zUXSOHIHOZ5ePcagPF6rvd6+xjU11ehs
Ip2Xec/o8GjpqkNJkbBLCyarMFAv+tFkEjUoYDZHWrW90Pp9dtVxqQ7tb5mPbZj2
lxVIDtHkkInPE6M53ym2hHk8TP46YQnHqHQtOTtg5yWbOqMSyZnoXqmdbgI26Zej
Elk3oAiFoBvXdsX327p1+FVy61iGVxOorOLpwb4oU2hJR4RuKNY=
=Guus
-----END PGP SIGNATURE-----