aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2024-08-05 14:03:20 -0400
committerTom Lane <tgl@sss.pgh.pa.us>2024-08-05 14:03:20 -0400
commit6eca8a5673307ce52f892f083df0b958d35f09e1 (patch)
treea61b29fc276146a323a37c1a8c19d1fa01ddeffb
parente81e53a0c1faf2b8f5fe8822d7218c91aeebea52 (diff)
downloadpostgresql-6eca8a5673307ce52f892f083df0b958d35f09e1.tar.gz
postgresql-6eca8a5673307ce52f892f083df0b958d35f09e1.zip
Last-minute updates for release notes.
Security: CVE-2024-7348
-rw-r--r--doc/src/sgml/release-15.sgml39
1 files changed, 39 insertions, 0 deletions
diff --git a/doc/src/sgml/release-15.sgml b/doc/src/sgml/release-15.sgml
index d5d96b3a6d0..d05b44a3cf8 100644
--- a/doc/src/sgml/release-15.sgml
+++ b/doc/src/sgml/release-15.sgml
@@ -35,6 +35,45 @@
<listitem>
<!--
+Author: Masahiko Sawada <msawada@postgresql.org>
+Branch: master [66e94448a] 2024-08-05 06:05:33 -0700
+Branch: REL_17_STABLE [fdf218f1d] 2024-08-05 06:05:30 -0700
+Branch: REL_16_STABLE [6aba85a4b] 2024-08-05 06:05:28 -0700
+Branch: REL_15_STABLE [e81e53a0c] 2024-08-05 06:05:25 -0700
+Branch: REL_14_STABLE [72ef1675e] 2024-08-05 06:05:23 -0700
+Branch: REL_13_STABLE [bbc94abf6] 2024-08-05 06:05:20 -0700
+Branch: REL_12_STABLE [79c7a7e29] 2024-08-05 06:05:17 -0700
+-->
+ <para>
+ Prevent unauthorized code execution
+ during <application>pg_dump</application> (Masahiko Sawada)
+ </para>
+
+ <para>
+ An attacker able to create and drop non-temporary objects could
+ inject SQL code that would be executed by a
+ concurrent <application>pg_dump</application> session with the
+ privileges of the role running <application>pg_dump</application>
+ (which is often a superuser). The attack involves replacing a
+ sequence or similar object with a view or foreign table that will
+ execute malicious code. To prevent this, introduce a new server
+ parameter <varname>restrict_nonsystem_relation_kind</varname> that
+ can disable expansion of non-builtin views as well as access to
+ foreign tables, and teach <application>pg_dump</application> to set
+ it when available. Note that the attack is prevented only if
+ both <application>pg_dump</application> and the server it is dumping
+ from are new enough to have this fix.
+ </para>
+
+ <para>
+ The <productname>PostgreSQL</productname> Project thanks
+ Noah Misch for reporting this problem.
+ (CVE-2024-7348)
+ </para>
+ </listitem>
+
+ <listitem>
+<!--
Author: Melanie Plageman <melanieplageman@gmail.com>
Branch: master [83c39a1f7] 2024-07-19 12:04:00 -0400
Branch: REL_17_STABLE [fd4f12df5] 2024-07-19 12:12:03 -0400