diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2016-08-08 11:56:11 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2016-08-08 11:56:11 -0400 |
commit | 6bb96c0a0699444ead4746e483fd56de3be5539c (patch) | |
tree | 4d05da99de88a35fb12c6bc8ef2492e40524907c | |
parent | d555d26429568e1a95f75c1a751933ebb63b82c6 (diff) | |
download | postgresql-6bb96c0a0699444ead4746e483fd56de3be5539c.tar.gz postgresql-6bb96c0a0699444ead4746e483fd56de3be5539c.zip |
Last-minute updates for release notes.
Security: CVE-2016-5423, CVE-2016-5424
-rw-r--r-- | doc/src/sgml/release-9.1.sgml | 80 |
1 files changed, 80 insertions, 0 deletions
diff --git a/doc/src/sgml/release-9.1.sgml b/doc/src/sgml/release-9.1.sgml index b3a7aa16cc6..a66ca0d5b3d 100644 --- a/doc/src/sgml/release-9.1.sgml +++ b/doc/src/sgml/release-9.1.sgml @@ -42,6 +42,72 @@ <listitem> <para> + Fix possible mis-evaluation of + nested <literal>CASE</>-<literal>WHEN</> expressions (Heikki + Linnakangas, Michael Paquier, Tom Lane) + </para> + + <para> + A <literal>CASE</> expression appearing within the test value + subexpression of another <literal>CASE</> could become confused about + whether its own test value was null or not. Also, inlining of a SQL + function implementing the equality operator used by + a <literal>CASE</> expression could result in passing the wrong test + value to functions called within a <literal>CASE</> expression in the + SQL function's body. If the test values were of different data + types, a crash might result; moreover such situations could be abused + to allow disclosure of portions of server memory. (CVE-2016-5423) + </para> + </listitem> + + <listitem> + <para> + Fix client programs' handling of special characters in database and + role names (Noah Misch, Nathan Bossart, Michael Paquier) + </para> + + <para> + Numerous places in <application>vacuumdb</> and other client programs + could become confused by database and role names containing double + quotes or backslashes. Tighten up quoting rules to make that safe. + Also, ensure that when a conninfo string is used as a database name + parameter to these programs, it is correctly treated as such throughout. + </para> + + <para> + Fix handling of paired double quotes + in <application>psql</>'s <command>\connect</> + and <command>\password</> commands to match the documentation. + </para> + + <para> + Introduce a new <option>-reuse-previous</> option + in <application>psql</>'s <command>\connect</> command to allow + explicit control of whether to re-use connection parameters from a + previous connection. (Without this, the choice is based on whether + the database name looks like a conninfo string, as before.) This + allows secure handling of database names containing special + characters in <application>pg_dumpall</> scripts. + </para> + + <para> + <application>pg_dumpall</> now refuses to deal with database and role + names containing carriage returns or newlines, as it seems impractical + to quote those characters safely on Windows. In future we may reject + such names on the server side, but that step has not been taken yet. + </para> + + <para> + These are considered security fixes because crafted object names + containing special characters could have been used to execute + commands with superuser privileges the next time a superuser + executes <application>pg_dumpall</> or other routine maintenance + operations. (CVE-2016-5424) + </para> + </listitem> + + <listitem> + <para> Fix corner-case misbehaviors for <literal>IS NULL</>/<literal>IS NOT NULL</> applied to nested composite values (Andrew Gierth, Tom Lane) </para> @@ -79,6 +145,20 @@ <listitem> <para> + Fix several one-byte buffer over-reads in <function>to_number()</> + (Peter Eisentraut) + </para> + + <para> + In several cases the <function>to_number()</> function would read one + more character than it should from the input string. There is a + small chance of a crash, if the input happens to be adjacent to the + end of memory. + </para> + </listitem> + + <listitem> + <para> Avoid unsafe intermediate state during expensive paths through <function>heap_update()</> (Masahiko Sawada, Andres Freund) </para> |