Autovacuum, CLUSTER, CREATE INDEX, REINDEX, REFRESH MATERIALIZED VIEW,
and pg_amcheck activated the "security restricted operation" protection
mechanism too late, or even not at all in some code paths. A user having
permission to create non-temporary objects within a database could
define an object that would execute arbitrary SQL code with superuser
permissions the next time that autovacuum processed the object, or that
some superuser ran one of the affected commands against it.
The PostgreSQL Project thanks Alexander Lakhin for reporting this
problem.
(CVE-2022-1552)
This bug was fixed in the package postgresql-12 - 12.11-0ubuntu0. 20.04.1
--------------- 0ubuntu0. 20.04.1) focal-security; urgency=medium
postgresql-12 (12.11-
* New upstream version (LP: #1973627)
+ A dump/restore is not required for those running 12.X.
+ However, if you are upgrading from a version earlier than 12.10,
see those release notes as well.
+ Confine additional operations within "security restricted operation"
sandboxes (Sergey Shinderuk, Noah Misch).
Autovacuum, CLUSTER, CREATE INDEX, REINDEX, REFRESH MATERIALIZED VIEW,
and pg_amcheck activated the "security restricted operation" protection
mechanism too late, or even not at all in some code paths. A user having
permission to create non-temporary objects within a database could
define an object that would execute arbitrary SQL code with superuser
permissions the next time that autovacuum processed the object, or that
some superuser ran one of the affected commands against it.
The PostgreSQL Project thanks Alexander Lakhin for reporting this CVE-2022- 1552)
problem.
(
+ Details about these and many further changes can be found at: /www.postgresql .org/docs/ 12/release- 12-11.html
https:/
-- Sergio Durigan Junior <email address hidden> Tue, 17 May 2022 22:10:51 -0400