← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1892335] Re: New upstream microreleases 9.5.23 10.14 and 12.4

 

This bug was fixed in the package postgresql-9.5 -
9.5.23-0ubuntu0.16.04.1

---------------
postgresql-9.5 (9.5.23-0ubuntu0.16.04.1) xenial-security; urgency=medium

  * New upstream release (LP: #1892335).
    - Make contrib modules' installation scripts more secure (Tom Lane)

      Attacks similar to those described in CVE-2018-1058 could be carried out
      against an extension installation script, if the attacker can create
      objects in either the extension's target schema or the schema of some
      prerequisite extension.  Since extensions often require superuser
      privilege to install, this can open a path to obtaining superuser
      privilege.  To mitigate this risk, be more careful about the search_path
      used to run an installation script; disable check_function_bodies within
      the script; and fix catalog-adjustment queries used in some contrib
      modules to ensure they are secure.  Also provide documentation to help
      third-party extension authors make their installation scripts secure.
      This is not a complete solution; extensions that depend on other
      extensions can still be at risk if installed carelessly.
      CVE-2020-14350

    - Details about these and many further changes can be found at:
      https://www.postgresql.org/docs/9.5/static/release-9-5-22.html
      https://www.postgresql.org/docs/9.5/static/release-9-5-23.html

 -- Christian Ehrhardt <christian.ehrhardt@xxxxxxxxxxxxx>  Thu, 20 Aug
2020 11:29:10 +0200

** Changed in: postgresql-9.5 (Ubuntu Xenial)
       Status: Triaged => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1058

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14350

** Changed in: postgresql-10 (Ubuntu Bionic)
       Status: Triaged => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14349

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1892335

Title:
  New upstream microreleases 9.5.23 10.14 and 12.4

Status in postgresql-12 package in Ubuntu:
  Fix Committed
Status in postgresql-9.5 source package in Xenial:
  Fix Released
Status in postgresql-10 source package in Bionic:
  Fix Released
Status in postgresql-12 source package in Focal:
  Triaged

Bug description:
  [Impact]

   * MRE for latest stable fixes of Postgres release on August 13th.

  [Test Case]

   * The Postgres MREs traditionally rely on the large set of autopkgtests
     to run for verification. In a PPA those are all already pre-checked to
     be good for this upload.

  [Regression Potential]

   * Upstreams tests are usually great and in additon in the Archive there
     are plenty of autopkgtests that in the past catched issues before being
     released.
     But never the less there always is a risk for something to break. Since
     these are general stable releases I can't pinpoint them to a most-likely
     area.
     - usually this works smoothly except a few test hickups (flaky) that need to be
       clarified to be sure. Pre-checks will catch those to be discussed upfront (as last time)

  [Other Info]

   * This is a reoccurring MRE, see below and all the references
   * This includes a fix for two CVEs:
     CVE-2020-14349
     CVE-2020-14350

  ---

  Current versions in supported releases:
   postgresql-9.5 | 9.5.21-0ubuntu0.16.04.1 xenial
   postgresql-10 | 10.12-0ubuntu0.18.04.1 bionic
   postgresql-12 | 12.2-4 focal

  
  Special cases:
  - Groovy will as usual be synced from Debian.
     I already see
     postgresql-12 | 12.4-1       | groovy-proposed | source, amd64, i386, ppc64el, s390x

  Last relevant related stable updates: 9.5.23, 10.14 and 12.4
  You'll see that the last update was missed, so I'll combined them.

  Standing MRE - Consider last updates as template:
  - pad.lv/1637236
  - pad.lv/1664478
  - pad.lv/1690730
  - pad.lv/1713979
  - pad.lv/1730661
  - pad.lv/1747676
  - pad.lv/1752271
  - pad.lv/1786938
  - pad.lv/1815665
  - pad.lv/1828012
  - pad.lv/1833211
  - pad.lv/1839058
  - pad.lv/1863108

  As usual we test and prep from the PPA and then push through
  SRU/Security as applicable.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-12/+bug/1892335/+subscriptions