#15385 closed enhancement (fixed)
postgresql-13.4
Reported by: | Bruce Dubbs | Owned by: | Bruce Dubbs |
---|---|---|---|
Priority: | elevated | Milestone: | 11.0 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New minor version.
Change History (4)
comment:1 by , 4 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:2 by , 4 years ago
comment:3 by , 4 years ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at commit 51a7abb732576ee55fd55603c5560bd0ced14b24
Package updates. Update to postgresql-13.4. Update to unbound-1.13.2.
comment:4 by , 4 years ago
Priority: | normal → elevated |
---|
Over in the release notes, a security vulnerability was described as being fixed:
Security Issues CVE-2021-3677: Memory disclosure in certain queries Versions Affected: 11 - 13. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
I've filed SA-10.1-092 for it
Note:
See TracTickets
for help on using tickets.
Changes for this version are at https://www.postgresql.org/docs/current/release-13-4.html#id-1.11.6.5.5