-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 01 Dec 2020 10:04:12 +0100 Source: postgresql-11 Binary: postgresql-doc-11 Architecture: all Version: 11.10-0+deb10u1 Distribution: buster Urgency: medium Maintainer: all Build Daemon (x86-grnet-02) Changed-By: Christoph Berg Description: postgresql-doc-11 - documentation for the PostgreSQL database management system Closes: 974063 Changes: postgresql-11 (11.10-0+deb10u1) buster; urgency=medium . * New upstream version. + Fixes timetz regression test failures. (Closes: #974063) . + Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers within index expressions and materialized view queries (Noah Misch) . This is essentially a leak in the security restricted operation sandbox mechanism. An attacker having permission to create non-temporary SQL objects could parlay this leak to execute arbitrary SQL code as a superuser. . The PostgreSQL Project thanks Etienne Stalmans for reporting this problem. (CVE-2020-25695) . + Fix usage of complex connection-string parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb (Tom Lane) . The -d parameter of pg_dump and pg_restore, or the --maintenance-db parameter of the other programs mentioned, can be a connection string containing multiple connection parameters rather than just a database name. In cases where these programs need to initiate additional connections, such as parallel processing or processing of multiple databases, the connection string was forgotten and just the basic connection parameters (database name, host, port, and username) were used for the additional connections. This could lead to connection failures if the connection string included any other essential information, such as non-default SSL or GSS parameters. Worse, the connection might succeed but not be encrypted as intended, or be vulnerable to man-in-the-middle attacks that the intended connection parameters would have prevented. (CVE-2020-25694) . + When psql's \connect command re-uses connection parameters, ensure that all non-overridden parameters from a previous connection string are re-used (Tom Lane) . This avoids cases where reconnection might fail due to omission of relevant parameters, such as non-default SSL or GSS options. Worse, the reconnection might succeed but not be encrypted as intended, or be vulnerable to man-in-the-middle attacks that the intended connection parameters would have prevented. This is largely the same problem as just cited for pg_dump et al, although psql's behavior is more complex since the user may intentionally override some connection parameters. (CVE-2020-25694) . + Prevent psql's \gset command from modifying specially-treated variables (Noah Misch) . \gset without a prefix would overwrite whatever variables the server told it to. Thus, a compromised server could set specially-treated variables such as PROMPT1, giving the ability to execute arbitrary shell code in the user's session. . The PostgreSQL Project thanks Nick Cleaton for reporting this problem. (CVE-2020-25696) Checksums-Sha1: d1f503df551c9780a34ac7b2a0a1b0c4cd355ca6 9357 postgresql-11_11.10-0+deb10u1_all.buildinfo 816c484e6f9aec68d3a23a6f917f668c2669e48c 1830212 postgresql-doc-11_11.10-0+deb10u1_all.deb Checksums-Sha256: b433738ca863f69c6a79ac1009cfab44b9da2c010e529b778a700a99526f6ffa 9357 postgresql-11_11.10-0+deb10u1_all.buildinfo 68288f360ab55ed12368bf6bd267b7c89fb97b91878630a865f2b9273b99ead1 1830212 postgresql-doc-11_11.10-0+deb10u1_all.deb Files: 40575afcf28eda1fef2b7a451eb9090e 9357 database optional postgresql-11_11.10-0+deb10u1_all.buildinfo c8cf143ceb4addf31225b2e2016db6d2 1830212 doc optional postgresql-doc-11_11.10-0+deb10u1_all.deb -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEr8VQnLOMZFel2HhJYnXj47vuYfwFAl/Nl7sACgkQYnXj47vu YfzHFg//bpfqEkWAc6jTdl57oWU3/54t5M88ieXReYMKNorYPOERpNNpA9N1Enxp odfz9+LBbh5vtmb+zJHkM6ZX/yWqGg9+3n2I5JrYg0zXDxImI1JmVHMU0xUed0uE XZ1uNGVLa34RvA/EEIVfFLUmfEMl3+AdzzEIl6tzD3o/Jnxkac4yZ+t4gIokjbZ9 /NHpX0ditOaAcWFbr2iFR66GrbcuOLS5ePnkUzAWEmY1tfOJV5eYXJJFWEvacKSa 0YrPFu135HRof3drgFItuzRmpiwqFj4QP+4M7pvjAjokoDdgkeQRK9sb2i0JOlC2 r5iDhE78ucTw7WwdW5nSIqZUkamGlRpKHmwulRdGRzBRvcWXSb2kq2jpsZlHGBFg Fti7RI7sXeNm2Mtm6/IuVbMnELby09cbxB8wq73oV2YssaEAS0ru5YOfQLx5PkGB vHhVjB/e9jMDLtStyUO4d6RakTNgUpj49CSgPE+qjOM5rjIhSwHcx2DCrPi0Sy94 Xuru8/Cwtaj3d5UrF/wFlOeXHI5kwm9pHe7dLSN5tUsvjnyiWuP4l4BZmDX2l5MR FcO6DHmP5qWIvmFazODn6Xo8LzP6KlkyRmHJzFMyt2tRtuWafNSj2spQzHSyd9Mx nYzO4mKnm3iRLzNcDTvu2+Ljw6iplATh74/YqkfuKfTy+U2xIPA= =UBQr -----END PGP SIGNATURE-----