postgresql-9.5 updated to version 9.5.24-1.pgdg+1

From: apt(dot)postgresql(dot)org Repository Update <noreply(at)postgresql(dot)org>
To: PostgreSQL on Debian and Ubuntu <pgsql-pkg-debian(at)lists(dot)postgresql(dot)org>
Subject: postgresql-9.5 updated to version 9.5.24-1.pgdg+1
Date: 2020-11-12 12:19:37
Message-ID: E1kdBZh-0004In-W8@atalia.postgresql.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-pkg-debian

The package postgresql-9.5 was updated on apt.postgresql.org.

apt-listchanges: Changelogs
---------------------------

postgresql-9.5 (9.5.24-1.pgdg+1) sid-pgdg; urgency=medium

* Rebuild for sid-pgdg.
* Changes applied by generate-pgdg-source:
+ Moving lib packages to component 9.5.
+ Enabling cassert.

-- PostgreSQL on Debian and Ubuntu <pgsql-pkg-debian(at)lists(dot)postgresql(dot)org> Wed, 23 Sep 2020 20:43:41 +0200

postgresql-9.5 (9.5.24-1) unstable; urgency=medium

* New upstream version.
+ Fixes timetz regression test failures. (Closes: #974063)

+ Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers
within index expressions and materialized view queries (Noah Misch)

This is essentially a leak in the security restricted operation sandbox
mechanism. An attacker having permission to create non-temporary SQL
objects could parlay this leak to execute arbitrary SQL code as a
superuser.

The PostgreSQL Project thanks Etienne Stalmans for reporting this
problem. (CVE-2020-25695)

+ Fix usage of complex connection-string parameters in pg_dump,
pg_restore, clusterdb, reindexdb, and vacuumdb (Tom Lane)

The -d parameter of pg_dump and pg_restore, or the --maintenance-db
parameter of the other programs mentioned, can be a connection string
containing multiple connection parameters rather than just a database
name. In cases where these programs need to initiate additional
connections, such as parallel processing or processing of multiple
databases, the connection string was forgotten and just the basic
connection parameters (database name, host, port, and username) were
used for the additional connections. This could lead to connection
failures if the connection string included any other essential
information, such as non-default SSL or GSS parameters. Worse, the
connection might succeed but not be encrypted as intended, or be
vulnerable to man-in-the-middle attacks that the intended connection
parameters would have prevented. (CVE-2020-25694)

+ When psql's

Browse pgsql-pkg-debian by date

  From Date Subject
Next Message apt.postgresql.org Repository Update 2020-11-12 12:28:20 postgresql-common updated to version 223.pgdg+1
Previous Message apt.postgresql.org Repository Update 2020-11-12 12:15:20 postgresql-9.6 updated to version 9.6.20-1.pgdg+1