group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #06969
[Bug 1614113] Re: New upstream microreleases 9.1.23, 9.3.14, 9.5.4
This bug was fixed in the package postgresql-9.3 - 9.3.14-0ubuntu0.14.04
---------------
postgresql-9.3 (9.3.14-0ubuntu0.14.04) trusty-security; urgency=medium
* New upstream security/bug fix release (LP: #1614113):
- Fix possible mis-evaluation of nested CASE-WHEN expressions
A CASE expression appearing within the test value subexpression of
another CASE could become confused about whether its own test value was
null or not. Also, inlining of a SQL function implementing the equality
operator used by a CASE expression could result in passing the wrong
test value to functions called within a CASE expression in the SQL
function's body. If the test values were of different data types, a
crash might result; moreover such situations could be abused to allow
disclosure of portions of server memory. (CVE-2016-5423)
- Fix client programs' handling of special characters in database and role
names
Numerous places in vacuumdb and other client programs could become
confused by database and role names containing double quotes or
backslashes. Tighten up quoting rules to make that safe. Also, ensure
that when a conninfo string is used as a database name parameter to
these programs, it is correctly treated as such throughout.
Fix handling of paired double quotes in psql's \connect and \password
commands to match the documentation.
Introduce a new -reuse-previous option in psql's \connect command to
allow explicit control of whether to re-use connection parameters from a
previous connection. (Without this, the choice is based on whether the
database name looks like a conninfo string, as before.) This allows
secure handling of database names containing special characters in
pg_dumpall scripts.
pg_dumpall now refuses to deal with database and role names containing
carriage returns or newlines, as it seems impractical to quote those
characters safely on Windows. In future we may reject such names on the
server side, but that step has not been taken yet.
These are considered security fixes because crafted object names
containing special characters could have been used to execute commands
with superuser privileges the next time a superuser executes pg_dumpall
or other routine maintenance operations. (CVE-2016-5424)
- Details:
http://www.postgresql.org/docs/9.3/static/release-9-3-14.html
-- Martin Pitt <martin.pitt@xxxxxxxxxx> Wed, 17 Aug 2016 16:37:41
+0200
** Changed in: postgresql-9.3 (Ubuntu Trusty)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1614113
Title:
New upstream microreleases 9.1.23, 9.3.14, 9.5.4
Status in postgresql-9.1 package in Ubuntu:
Invalid
Status in postgresql-9.3 package in Ubuntu:
Invalid
Status in postgresql-9.1 source package in Precise:
Fix Released
Status in postgresql-9.1 source package in Trusty:
Fix Released
Status in postgresql-9.3 source package in Trusty:
Fix Released
Status in postgresql-9.5 source package in Xenial:
Fix Released
Status in postgresql-9.5 source package in Yakkety:
Fix Released
Bug description:
Last week PostgreSQL published new microreleases:
https://www.postgresql.org/about/news/1688/
These contain two CVEs, thus should go via -security.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.1/+bug/1614113/+subscriptions
References