aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2018-05-07 11:50:05 -0400
committerTom Lane <tgl@sss.pgh.pa.us>2018-05-07 11:50:05 -0400
commit27a65851801c41c66d72d8c55ffab093419da793 (patch)
tree6d1ab09107e3b9c4ce8b4156b40fe96b08f2d43e
parent20f01fc45996238f7f1007ba704d30663955150a (diff)
downloadpostgresql-27a65851801c41c66d72d8c55ffab093419da793.tar.gz
postgresql-27a65851801c41c66d72d8c55ffab093419da793.zip
Last-minute updates for release notes.
Security: CVE-2018-1115
-rw-r--r--doc/src/sgml/release-10.sgml44
-rw-r--r--doc/src/sgml/release-9.6.sgml38
2 files changed, 76 insertions, 6 deletions
diff --git a/doc/src/sgml/release-10.sgml b/doc/src/sgml/release-10.sgml
index 3f63c3b9af8..753cb458789 100644
--- a/doc/src/sgml/release-10.sgml
+++ b/doc/src/sgml/release-10.sgml
@@ -23,9 +23,14 @@
</para>
<para>
- However, if the function marking mistakes mentioned in the first two
- changelog entries below affect you, you will want to take steps to
- correct your database catalogs.
+ However, if you use the <filename>adminpack</filename> extension,
+ you should update it as per the first changelog entry below.
+ </para>
+
+ <para>
+ Also, if the function marking mistakes mentioned in the second and
+ third changelog entries below affect you, you will want to take steps
+ to correct your database catalogs.
</para>
<para>
@@ -41,6 +46,39 @@
<listitem>
<!--
+Author: Stephen Frost <sfrost@snowman.net>
+Branch: master [7b347409f] 2018-05-07 10:10:33 -0400
+Branch: REL_10_STABLE [20f01fc45] 2018-05-07 10:10:41 -0400
+Branch: REL9_6_STABLE [53b79ab4f] 2018-05-07 10:10:45 -0400
+-->
+ <para>
+ Remove public execute privilege
+ from <filename>contrib/adminpack</filename>'s
+ <function>pg_logfile_rotate()</function> function (Stephen Frost)
+ </para>
+
+ <para>
+ <function>pg_logfile_rotate()</function> is a deprecated wrapper
+ for the core function <function>pg_rotate_logfile()</function>.
+ When that function was changed to rely on SQL privileges for access
+ control rather than a hard-coded superuser
+ check, <function>pg_logfile_rotate()</function> should have been
+ updated as well, but the need for this was missed. Hence,
+ if <filename>adminpack</filename> is installed, any user could
+ request a logfile rotation, creating a minor security issue.
+ </para>
+
+ <para>
+ After installing this update, administrators should
+ update <filename>adminpack</filename> by performing
+ <literal>ALTER EXTENSION adminpack UPDATE</literal> in each
+ database in which <filename>adminpack</filename> is installed.
+ (CVE-2018-1115)
+ </para>
+ </listitem>
+
+ <listitem>
+<!--
Author: Tom Lane <tgl@sss.pgh.pa.us>
Branch: master [11002f8af] 2018-03-30 18:14:51 -0400
Branch: REL_10_STABLE [283262cd9] 2018-03-30 18:14:51 -0400
diff --git a/doc/src/sgml/release-9.6.sgml b/doc/src/sgml/release-9.6.sgml
index 9e6700c8fd8..98bf664f215 100644
--- a/doc/src/sgml/release-9.6.sgml
+++ b/doc/src/sgml/release-9.6.sgml
@@ -23,9 +23,14 @@
</para>
<para>
- However, if the function marking mistakes mentioned in the first two
- changelog entries below affect you, you will want to take steps to
- correct your database catalogs.
+ However, if you use the <filename>adminpack</filename> extension,
+ you should update it as per the first changelog entry below.
+ </para>
+
+ <para>
+ Also, if the function marking mistakes mentioned in the second and
+ third changelog entries below affect you, you will want to take steps
+ to correct your database catalogs.
</para>
<para>
@@ -41,6 +46,33 @@
<listitem>
<para>
+ Remove public execute privilege
+ from <filename>contrib/adminpack</filename>'s
+ <function>pg_logfile_rotate()</function> function (Stephen Frost)
+ </para>
+
+ <para>
+ <function>pg_logfile_rotate()</function> is a deprecated wrapper
+ for the core function <function>pg_rotate_logfile()</function>.
+ When that function was changed to rely on SQL privileges for access
+ control rather than a hard-coded superuser
+ check, <function>pg_logfile_rotate()</function> should have been
+ updated as well, but the need for this was missed. Hence,
+ if <filename>adminpack</filename> is installed, any user could
+ request a logfile rotation, creating a minor security issue.
+ </para>
+
+ <para>
+ After installing this update, administrators should
+ update <filename>adminpack</filename> by performing
+ <literal>ALTER EXTENSION adminpack UPDATE</literal> in each
+ database in which <filename>adminpack</filename> is installed.
+ (CVE-2018-1115)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Fix incorrect volatility markings on a few built-in functions
(Thomas Munro, Tom Lane)
</para>