The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 15.2, 14.7, 13.10, 12.14, and 11.19. This release closes one security vulnerability and fixes over 60 bugs reported over the last several months.
For the full list of changes, please review the release notes.
Versions Affected: 12 - 15.
A modified, unauthenticated server or an unauthenticated man-in-the-middle can
send an unterminated string during the establishment of Kerberos transport
encryption. When a libpq
client application has a Kerberos credential cache
and doesn't explicitly disable option
gssencmode
,
a server can cause libpq
to over-read and report an error message containing
uninitialized bytes from and following its receive buffer. If libpq
's caller
somehow makes that message accessible to the attacker, this achieves a
disclosure of the over-read bytes. We have not confirmed or ruled out viability
of attacks that arrange for a crash or for presence of notable, confidential
information in disclosed bytes.
The PostgreSQL project thanks Jacob Champion for reporting this problem.
This update fixes over 60 bugs that were reported in the last several months. The issues listed below affect PostgreSQL 15. Some of these issues may also affect other supported versions of PostgreSQL.
Included in this release:
GENERATED
columns in child tables if the GENERATED
column does not exist in the parent
table or the child generated column has different dependencies than the parent.MERGE
command.WITH RECURSIVE ... CYCLE
query to access its SET
output column.BEFORE ROW
trigger may not process rows that
should be available.jsonpath
existence checks.jsonb
subscripting
that come directly from a text
column in a table.checkpoint_completion_target
on reload.recovery_target_xid
mode.VACUUM
.ANALYZE
when using
query pipelining.DROP DATABASE
and logical replication worker process.CREATE SUBSCRIPTION
fails its connection attempt.hot_standby
enabled that are processing SELECT
queries.pgoutput
, to not send columns
that are not listed in a table's replication
column list.pg_basebackup
.pg_dump
in
--if-exists
mode when the
public
schema
has a non-default owner.psql
commands \sf
and \ef
to handle SQL-language functions that have
SQL-standard function bodies
(i.e. BEGIN ATOMIC
).ALTER FUNCTION/PROCEDURE/ROUTINE ... SET SCHEMA
.pageinspect
extension to mark its disk-accessing functions as PARALLEL RESTRICTED
.seg
extension to
not crash or print garbage if an input number has more than 127 digits.This release also updates time zone data files to tzdata release 2022g for DST law changes in Greenland and Mexico, plus historical corrections for northern Canada, Colombia, and Singapore. Notably, a new timezone, America/Ciudad_Juarez, has been split off from America/Ojinaga.
For the full list of changes available, please review the release notes.
All PostgreSQL update releases are cumulative. As with other minor releases,
users are not required to dump and reload their database or use pg_upgrade
in
order to apply this update release; you may simply shutdown PostgreSQL and
update its binaries.
Users who have skipped one or more update releases may need to run additional, post-update steps; please see the release notes for earlier versions for details.
For more details, please see the release notes.