diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2018-05-07 11:50:05 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2018-05-07 11:50:05 -0400 |
commit | 27a65851801c41c66d72d8c55ffab093419da793 (patch) | |
tree | 6d1ab09107e3b9c4ce8b4156b40fe96b08f2d43e | |
parent | 20f01fc45996238f7f1007ba704d30663955150a (diff) | |
download | postgresql-27a65851801c41c66d72d8c55ffab093419da793.tar.gz postgresql-27a65851801c41c66d72d8c55ffab093419da793.zip |
Last-minute updates for release notes.
Security: CVE-2018-1115
-rw-r--r-- | doc/src/sgml/release-10.sgml | 44 | ||||
-rw-r--r-- | doc/src/sgml/release-9.6.sgml | 38 |
2 files changed, 76 insertions, 6 deletions
diff --git a/doc/src/sgml/release-10.sgml b/doc/src/sgml/release-10.sgml index 3f63c3b9af8..753cb458789 100644 --- a/doc/src/sgml/release-10.sgml +++ b/doc/src/sgml/release-10.sgml @@ -23,9 +23,14 @@ </para> <para> - However, if the function marking mistakes mentioned in the first two - changelog entries below affect you, you will want to take steps to - correct your database catalogs. + However, if you use the <filename>adminpack</filename> extension, + you should update it as per the first changelog entry below. + </para> + + <para> + Also, if the function marking mistakes mentioned in the second and + third changelog entries below affect you, you will want to take steps + to correct your database catalogs. </para> <para> @@ -41,6 +46,39 @@ <listitem> <!-- +Author: Stephen Frost <sfrost@snowman.net> +Branch: master [7b347409f] 2018-05-07 10:10:33 -0400 +Branch: REL_10_STABLE [20f01fc45] 2018-05-07 10:10:41 -0400 +Branch: REL9_6_STABLE [53b79ab4f] 2018-05-07 10:10:45 -0400 +--> + <para> + Remove public execute privilege + from <filename>contrib/adminpack</filename>'s + <function>pg_logfile_rotate()</function> function (Stephen Frost) + </para> + + <para> + <function>pg_logfile_rotate()</function> is a deprecated wrapper + for the core function <function>pg_rotate_logfile()</function>. + When that function was changed to rely on SQL privileges for access + control rather than a hard-coded superuser + check, <function>pg_logfile_rotate()</function> should have been + updated as well, but the need for this was missed. Hence, + if <filename>adminpack</filename> is installed, any user could + request a logfile rotation, creating a minor security issue. + </para> + + <para> + After installing this update, administrators should + update <filename>adminpack</filename> by performing + <literal>ALTER EXTENSION adminpack UPDATE</literal> in each + database in which <filename>adminpack</filename> is installed. + (CVE-2018-1115) + </para> + </listitem> + + <listitem> +<!-- Author: Tom Lane <tgl@sss.pgh.pa.us> Branch: master [11002f8af] 2018-03-30 18:14:51 -0400 Branch: REL_10_STABLE [283262cd9] 2018-03-30 18:14:51 -0400 diff --git a/doc/src/sgml/release-9.6.sgml b/doc/src/sgml/release-9.6.sgml index 9e6700c8fd8..98bf664f215 100644 --- a/doc/src/sgml/release-9.6.sgml +++ b/doc/src/sgml/release-9.6.sgml @@ -23,9 +23,14 @@ </para> <para> - However, if the function marking mistakes mentioned in the first two - changelog entries below affect you, you will want to take steps to - correct your database catalogs. + However, if you use the <filename>adminpack</filename> extension, + you should update it as per the first changelog entry below. + </para> + + <para> + Also, if the function marking mistakes mentioned in the second and + third changelog entries below affect you, you will want to take steps + to correct your database catalogs. </para> <para> @@ -41,6 +46,33 @@ <listitem> <para> + Remove public execute privilege + from <filename>contrib/adminpack</filename>'s + <function>pg_logfile_rotate()</function> function (Stephen Frost) + </para> + + <para> + <function>pg_logfile_rotate()</function> is a deprecated wrapper + for the core function <function>pg_rotate_logfile()</function>. + When that function was changed to rely on SQL privileges for access + control rather than a hard-coded superuser + check, <function>pg_logfile_rotate()</function> should have been + updated as well, but the need for this was missed. Hence, + if <filename>adminpack</filename> is installed, any user could + request a logfile rotation, creating a minor security issue. + </para> + + <para> + After installing this update, administrators should + update <filename>adminpack</filename> by performing + <literal>ALTER EXTENSION adminpack UPDATE</literal> in each + database in which <filename>adminpack</filename> is installed. + (CVE-2018-1115) + </para> + </listitem> + + <listitem> + <para> Fix incorrect volatility markings on a few built-in functions (Thomas Munro, Tom Lane) </para> |