-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Tue, 12 Nov 2024 15:12:10 +0100 Source: postgresql-13 Architecture: source Version: 13.17-0+deb11u1 Distribution: bullseye-security Urgency: medium Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org> Changed-By: Christoph Berg <myon@debian.org> Changes: postgresql-13 (13.17-0+deb11u1) bullseye-security; urgency=medium . * New upstream version 13.17. . + Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (Nathan Bossart) . If a CTE, subquery, sublink, security invoker view, or coercion projection in a query references a table with row-level security policies, we neglected to mark the resulting plan as potentially dependent on which role is executing it. This could lead to later query executions in the same session using the wrong plan, and then returning or hiding rows that should have been hidden or returned instead. . The PostgreSQL Project thanks Wolfgang Walther for reporting this problem. (CVE-2024-10976) . + Make libpq discard error messages received during SSL or GSS protocol negotiation (Jacob Champion) . An error message received before encryption negotiation is completed might have been injected by a man-in-the-middle, rather than being real server output. Reporting it opens the door to various security hazards; for example, the message might spoof a query result that a careless user could mistake for correct output. The best answer seems to be to discard such data and rely only on libpq's own report of the connection failure. . The PostgreSQL Project thanks Jacob Champion for reporting this problem. (CVE-2024-10977) . + Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (Tom Lane) . The SQL standard mandates that SET SESSION AUTHORIZATION have a side-effect of doing SET ROLE NONE. Our implementation of that was flawed, creating more interaction between the two settings than intended. Notably, rolling back a transaction that had done SET SESSION AUTHORIZATION would revert ROLE to NONE even if that had not been the previous state, so that the effective user ID might now be different from what it had been before the transaction. Transiently setting session_authorization in a function SET clause had a similar effect. A related bug was that if a parallel worker inspected current_setting('role'), it saw none even when it should see something else. . The PostgreSQL Project thanks Tom Lane for reporting this problem. (CVE-2024-10978) . + Prevent trusted PL/Perl code from changing environment variables (Andrew Dunstan, Noah Misch) . The ability to manipulate process environment variables such as PATH gives an attacker opportunities to execute arbitrary code. Therefore, trusted PLs must not offer the ability to do that. To fix plperl, replace %ENV with a tied hash that rejects any modification attempt with a warning. Untrusted plperlu retains the ability to change the environment. . The PostgreSQL Project thanks Coby Abrams for reporting this problem. (CVE-2024-10979) Checksums-Sha1: 27b9bc96875e268b80242de6e3c5b5098f9bf888 3703 postgresql-13_13.17-0+deb11u1.dsc a7472d5d7e3a5849e71e5523d2b892fccab14d2d 21681613 postgresql-13_13.17.orig.tar.bz2 f4bff6fe6f7c7ca8860e201ed1fb29ad9eae732f 35984 postgresql-13_13.17-0+deb11u1.debian.tar.xz Checksums-Sha256: d3d1aa7eeb5b4b1a44e8d922892fda7e77ca83f12e7f45629153cfdfa506c54d 3703 postgresql-13_13.17-0+deb11u1.dsc 022b0a6e7bc374a777eece33708895d7b60cae07d492b286b296a49d7395d78b 21681613 postgresql-13_13.17.orig.tar.bz2 cd368c147453712bd3331e2a83e35df486330486599c3267804eeec59e709033 35984 postgresql-13_13.17-0+deb11u1.debian.tar.xz Files: e4d6fed4f748b08ebf6c7fe1fc95d4d5 3703 database optional postgresql-13_13.17-0+deb11u1.dsc 037a7e0eedf2bded8636f796aa9120ed 21681613 database optional postgresql-13_13.17.orig.tar.bz2 93caeaa67a0a962965e558d99a9e542f 35984 database optional postgresql-13_13.17-0+deb11u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEXEj+YVf0kXlZcIfGTFprqxLSp64FAmc2HiwACgkQTFprqxLS p65tKg//eHcWrIfVdz5RWHpIjV80hCXCQL3IzcZ5ZJ8St3VZCqFM/1xnySRmksxo aq+C8urLKq0+rtRuxkd2y2n3gRTXlKV3qOqCoMKYemduj1zotD+JdDFYEBye5yPz vFy4kTlyynq2bysMZ27ygK4rXcuCXFX0wU+Tzlh5qHtm8Sx68C4Rf57gV9E9b3Ah xlPFVX0BowcnMabO7UGN/pBg9c88FhjpFoECIGX1G8vaToEclLT6eJ8/l2p4WXvL cLHP8BshpDiP4qtGjVgSdR7NLoUYQMrYs3gbqo1OXKQVh114gtRtSnNTewGubUiI JAFORpDapxmsoKcdOILLq54d2kzdvu3dsFgRmfpXlLBNRkVV3BsZkRf2Jkl4e67p gk8PPr8yDVgnunN2uTDn16isH5tCLTfEwnQyDjqMJ9q6FXFr0KN+jnb6sSLNgKSV tOJbILEgkjpnKwWTn57qEugyFohDvhNYNzn728b9h2/1u0VfqizvOAVtH11P05Ba 3AY4NnX60vR1WMP5xoMV+xOu2EF5gkcVKkyJGQJ6lPQCW9KZ8DV0NrZB23XuG6mf pea7JSCiKZfiQDVvp+aWxa4+kcGtvGc1I9pPs1aW68A76XcMpusviDLIgZTF+1gJ y/piNAIaj2HXTei3pvFCKrCGRUzViP7TuHc/j5p5pcAPmNhc+No= =zx4e -----END PGP SIGNATURE-----