Debian Patches

Status for pgpool2/4.1.4-3+deb11u1

Patch Description Author Forwarded Bugs Origin Last update
CVE-2023-22332-2.patch commit 6ee624f466b7e501a1d69d17a39cb0c3435e91da

Change the default value for wd_lifecheck_password to empty string as documented.
Bo Peng <pengbo@sraoss.co.jp> no https://github.com/pgpool/pgpool2/commit/6ee624f466b7e501a1d69d17a39cb0c3435e91da 2023-01-22
CVE-2024-45624.patch commit 7db3965794237a1427e7961aee7c4650b96bea7c

Fix multiple query cache vulnerabilities (CVE-2024-45624).

When the query cache feature is enabled, it was possible that a user
can read rows from tables that should not be visible for the user
through query cache.

- If query cache is created for a row security enabled table for user
A, and then other user B accesses the table via SET ROLE or SET
SESSION_AUTHORIZATION in the same session, it was possible for the
user B to retrieve rows which should not be visible from the user B.

- If query cache is created for a table for user A, and then other
user B accesses the table via SET ROLE or SET SESSION_AUTHORIZATION
in the same session, it was possible for the user B to retrieve rows
which should not be visible from the user B.

- If query cache is created for a table for a user, and then the
access right of the table is revoked from the user by REVOKE
command, still it was possible for the user to to retrieve the rows
through the query cache.

Besides the vulnerabilities, there were multiple bugs with the query
cache feature.

- If query cache is created for a row security enabled table for a
user, and then ALTER DATABASE BYPASSRLS or ALTER ROLE BYPASSRLS
disable the row security of the table, subsequent SELECT still
returns the same rows as before through the query cache.

- If query cache is created for a table for a user, and then ALTER
TABLE SET SCHEMA changes the search path to not allow to access the
table, subsequent SELECT still returns the rows as before through
the query cache.

To fix above, following changes are made:

- Do not allow to create query cache/use query cache for row security
enabled tables (even if the table is included in
cache_safe_memqcache_table_list).

- Do not allow to create query cache/use query cache if SET ROLE/SET
AUTHORIZATION is executed in the session (query cache invalidation
is performed when a table is modified as usual).

- Remove entire query cache if REVOKE/ALTER DATABASE/ALTER TABLE/ALTER
ROLE is executed. If the command is executed in an explicit
transaction, do not create query cache/use query cache until the
transaction gets committed (query cache invalidation is performed
when a table is modified as usual). If the transaction is aborted,
do not remove query cache.

Patch is created by Tatsuo Ishii.

Backpatch-through: v4.1
Bo Peng <pengbo@sraoss.co.jp> no 2024-09-07
pgpool2-debian-config.patch pgpool2 debian config Marco Nenciarini <mnencia@debian.org> no 2016-02-24
sbin-paths pgpool_setup + pg_md5 pathhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877851 no
987183 Fix connection count when query is canceled.
Fix connection count when query is canceled.

Connection counter was not counted down when a query is canceled.

Per bug 656.
Tatsuo Ishii <ishii@sraoss.co.jp> no 2020-10-29
CVE-2023-22332-1.patch commit 59f440e2c799fab59c0dbb0a321dbd4a53219edf

Do not expose wd_lifecheck_password in show pool_status command.

diff --git a/src/utils/pool_process_reporting.c b/src/utils/pool_process_reporting.c
index 3adbcf2d2..81df028e2 100644
Bo Peng <pengbo@sraoss.co.jp> no https://github.com/pgpool/pgpool2/commit/59f440e2c799fab59c0dbb0a321dbd4a53219edf 2023-01-22

All known versions for source package 'pgpool2'

Links