Bug 52461 - postgresql-9.6: Multiple issues (4.4)
postgresql-9.6: Multiple issues (4.4)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.4
All Linux
: P3 normal (vote)
: UCS 4.4-7-errata
Assigned To: Quality Assurance
Erik Damrose
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-12-07 09:40 CET by Quality Assurance
Modified: 2020-12-09 13:11 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2020-12-07 09:40:30 CET
New Debian postgresql-9.6 9.6.20-0+deb9u1 fixes:
This update addresses the following issues:

* 9.6.20-0+deb9u1 (Tue, 01 Dec 2020 12:11:51 +0100) * New upstream version. +  Fixes timetz regression test failures. + Block DECLARE CURSOR ... WITH HOLD  and firing of deferred triggers within index expressions and materialized  view queries (Noah Misch) This is essentially a leak in the security  restricted operation sandbox mechanism. An attacker having permission to  create non-temporary SQL objects could parlay this leak to execute  arbitrary SQL code as a superuser. The PostgreSQL Project thanks Etienne  Stalmans for reporting this problem. (CVE-2020-25695) + Fix usage of  complex connection-string parameters in pg_dump, pg_restore, clusterdb,  reindexdb, and vacuumdb (Tom Lane) The -d parameter of pg_dump and  pg_restore, or the --maintenance-db parameter of the other programs  mentioned, can be a connection string containing multiple connection  parameters rather than just a database name. In cases where these programs  need to initiate additional connections, such as parallel processing or  processing of multiple databases, the connection string was forgotten and  just the basic connection parameters (database name, host, port, and  username) were used for the additional connections. This could lead to  connection failures if the connection string included any other essential  information, such as non-default SSL or GSS parameters. Worse, the  connection might succeed but not be encrypted as intended, or be vulnerable  to man-in-the-middle attacks that the intended connection parameters would  have prevented. (CVE-2020-25694) + When psql's \connect command re-uses  connection parameters, ensure that all non-overridden parameters from a  previous connection string are re-used (Tom Lane) This avoids cases where  reconnection might fail due to omission of relevant parameters, such as  non-default SSL or GSS options. Worse, the reconnection might succeed but  not be encrypted as intended, or be parameters would have prevented. This  is largely the same problem as just cited for pg_dump et al, although  psql's behavior is more complex since the user may intentionally override  some connection parameters. (CVE-2020-25694) + Prevent psql's \gset command  from modifying specially-treated variables (Noah Misch) \gset without a  prefix would overwrite whatever variables the server told it to. Thus, a  compromised server could set specially-treated variables such as PROMPT1,  giving the ability to execute arbitrary shell code in the user's session.  The PostgreSQL Project thanks Nick Cleaton for reporting this problem.  (CVE-2020-25696)
Comment 1 Quality Assurance univentionstaff 2020-12-07 10:00:37 CET
--- mirror/ftp/4.4/unmaintained/4.4-7/source/postgresql-9.6_9.6.20-0A~4.4.0.202011211523.dsc
+++ apt/ucs_4.4-0-errata4.4-7/source/postgresql-9.6_9.6.20-0+deb9u1.dsc
@@ -1,11 +1,7 @@
-9.6.20-0A~4.4.0.202011211523 [Sat, 21 Nov 2020 15:23:38 +0100] Univention builddaemon <buildd@univention.de>:
+9.6.20-0+deb9u1 [Tue, 01 Dec 2020 12:11:51 +0100] Christoph Berg <myon@debian.org>:
 
-  * UCS auto build. No patches were applied to the original source package
-
-9.6.20-0 [Fri, 20 Nov 2020 18:14:02 +0100] Arvid Requate <requate@univention.de>:
-
-  * New upstream release
-    Debian changes by Christoph Berg <myon@debian.org>:
+  * New upstream version.
+    + Fixes timetz regression test failures. (Closes: #974063)
 
     + Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers
       within index expressions and materialized view queries (Noah Misch)
@@ -59,8 +55,6 @@
       The PostgreSQL Project thanks Nick Cleaton for reporting this problem.
       (CVE-2020-25696)
 
-  * Show more log files on failure.
-
 9.6.19-0+deb9u1 [Thu, 13 Aug 2020 10:32:13 +0200] Christoph Berg <myon@debian.org>:
 
   * New upstream version.

<http://10.200.17.11/4.4-7/#9188852967127818701>
Comment 2 Erik Damrose univentionstaff 2020-12-08 17:31:27 CET
Note: Security issues have been fixed previously with bug 52400. This is an import of the upstream debian package with the same fixes.

OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.4-7] 913cb647a0 Bug #52461: yaml
 doc/errata/staging/postgresql-9.6.yaml | 85 +++++++++++++++++++++-------------
 1 file changed, 52 insertions(+), 33 deletions(-)

[4.4-7] 003fad37e9 Bug #52461: postgresql-9.6 9.6.20-0+deb9u1
 doc/errata/staging/postgresql-9.6.yaml | 50 ++++++++++++++++++++++++++++++++++
 1 file changed, 50 insertions(+)