Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2025-01-01 Thread Roberto C . Sánchez
ds, -Roberto -- Roberto C. Sánchez

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-31 Thread Roberto C . Sánchez
7;t in the future either. My thinking was "ask once, bump the thread once after 2 or 3 weeks just in case it got lost in the noise (this is a busy list), and after that let the matter rest if there is no answer". Regards, -Roberto -- Roberto C. Sánchez

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-31 Thread Roberto C . Sánchez
h is no longer actively supported" or "no longer actively supported, and we do not want questions/discussions about it on this list". If the latter, then I will document this to ensure that we respect this boundary. Regards, -Roberto -- Roberto C. Sánchez

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-30 Thread Roberto C . Sánchez
issues (and data integrity bugs), then we would simply be using those. However, given the age of those releases, it is understandable that such releases are no longer being made. Regards, -Roberto -- Roberto C. Sánchez

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-30 Thread Roberto C . Sánchez
so 73c9f91a1b6d by the way, which is a follow up > of 5a2fed911a85 for CVE-2024-10978 related to parallel workers, it > would not apply to 9.4, for sure. > Definitely. That was relatively straightforward to figure out and confirm. Thanks for the hints. Regards, -Roberto -- Roberto C. Sánchez

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-30 Thread Roberto C . Sánchez
Hi Bruce, On Mon, Dec 30, 2024 at 04:58:26PM -0500, Bruce Momjian wrote: > On Mon, Dec 30, 2024 at 04:50:12PM -0500, Roberto C. Sánchez wrote: > > On Sat, Dec 14, 2024 at 09:50:23PM -0500, Roberto C. Sánchez wrote: > > > Greetings pgsql devs, > > > > > &g

Re: Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-30 Thread Roberto C . Sánchez
On Sat, Dec 14, 2024 at 09:50:23PM -0500, Roberto C. Sánchez wrote: > Greetings pgsql devs, > > I would appreciate a review of my strategy for backporting the commits > related to CVE-2024-10978. (I am working with versions 11, 9.6, and 9.4, > for some older Debian releases.) >

Backport of CVE-2024-10978 fix to older pgsql versions (11, 9.6, and 9.4)

2024-12-14 Thread Roberto C . Sánchez
Is it then correct to conclude the behavior which regressed in 9.6 and newer as a result of 4c9d96f74ba4e7d01c086ca54f217e242dd65fae was introduced after 9.4? And that hence in the case of backporting to 9.4 that c463338656ac47e5210fcf9fbf7d20efccce8de8 can be left out? Regards, -Roberto -- Roberto C. Sánchez

Re: Question concerning backport of CVE-2022-2625

2022-11-23 Thread Roberto C . Sánchez
on of where to look for the failure! Regards, -Roberto -- Roberto C. Sánchez

Re: Question concerning backport of CVE-2022-2625

2022-11-20 Thread Roberto C . Sánchez
to > touch @@>>, since there's no COMMUTATOR clause in the extension. > I understand your reticence to dive into a branch that is long dead from your perspective. That said, I am grateful for the insights you provided here. > It'd likely be a good idea to reproduce this with a gdb breakpoint > set at errfinish, and see exactly what's leading up to the error. > Thanks for this suggestion. I will see if I am able to isolate the precise cause of the failure with this. Regards, -Roberto -- Roberto C. Sánchez

Question concerning backport of CVE-2022-2625

2022-11-20 Thread Roberto C . Sánchez
.) If the apparently buggy behavior is not a sufficient guard, then is a backport of c94959d4110a1965472956cfd631082a96f64a84 in conjunction with the CVE-2022-2625 fix the correct solution? Regards, -Roberto -- Roberto C. Sánchez

Re: Request for assistance to backport CVE-2022-1552 fixes to 9.6 and 9.4

2022-07-27 Thread Roberto C . Sánchez
Hello pgsql-hackers, Is there anyone willing to review the patches that I prepared? I'd have substatntially more confidence in the patches with a review from an upstream developer who is familiar with the code. Regards, -Roberto On Mon, Jul 04, 2022 at 06:06:58PM -0400, Roberto C. Sá

Re: Request for assistance to backport CVE-2022-1552 fixes to 9.6 and 9.4

2022-07-04 Thread Roberto C . Sánchez
On Wed, Jun 08, 2022 at 05:31:22PM -0400, Roberto C. Sánchez wrote: > On Wed, Jun 08, 2022 at 04:15:47PM -0400, Tom Lane wrote: > > Roberto =?iso-8859-1?Q?C=2E_S=E1nchez?= writes: > > > I am investigating backporting the fixes for CVE-2022-1552 to 9.6 and > > > 9.

Re: Request for assistance to backport CVE-2022-1552 fixes to 9.6 and 9.4

2022-06-08 Thread Roberto C . Sánchez
e > Thanks for the pointer. > We're going to have to tweak that code somehow, and it's not yet > entirely clear how. > I will monitor the discussion to see what comes of it. Regards, -Roberto -- Roberto C. Sánchez

Request for assistance to backport CVE-2022-1552 fixes to 9.6 and 9.4

2022-06-08 Thread Roberto C . Sánchez
vulnerability in both 9.6 and 9.4. However, the SUSE security information page for CVE-2022-1552 [0] lists 9.6 as "not affected". Presumably this is based on the language in the upstream advisory "Versions Affected: 10 - 14." [0] https://www.suse.com/security/cve/CVE-2022-1552.html --