Opened 11 months ago
Closed 10 months ago
#19779 closed enhancement (fixed)
postgresql-16.3
Reported by: | Bruce Dubbs | Owned by: | Douglas R. Reno |
---|---|---|---|
Priority: | elevated | Milestone: | 12.2 |
Component: | BOOK | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New minor version.
Change History (4)
comment:1 by , 11 months ago
comment:2 by , 11 months ago
Priority: | normal → elevated |
---|
The CVE needs further actions on existing DBs, just upgrading PG is not enough.
comment:3 by , 10 months ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:4 by , 10 months ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
Fixed at 2adbfb6ea78b6cdc2670191dfd9c0fa14830aad2
SA-12.1-048 issued. Note that as Thomas mentioned above, additional commands must be run on existing databases in a cluster.
Note:
See TracTickets
for help on using tickets.
Release date: 2024-05-09
This release contains a variety of fixes from 16.2. For information about new features in major release 16, see Section E.4.
A dump/restore is not required for those running 16.X.
However, a security vulnerability was found in the system views pg_stats_ext and pg_stats_ext_exprs, potentially allowing authenticated database users to see data they shouldn't. If this is of concern in your installation, follow the steps in the first changelog entry below to rectify it.
Also, if you are upgrading from a version earlier than 16.2, see Section E.2.
\i /usr/share/postgresql/fix-CVE-2024-4317.sql
(adjust the file path as appropriate). Any error probably indicates that you've used the wrong script version. It will not hurt to run the script more than once.ALTER DATABASE template0 WITH ALLOW_CONNECTIONS true;