diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2024-08-05 14:03:20 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2024-08-05 14:03:20 -0400 |
commit | 6eca8a5673307ce52f892f083df0b958d35f09e1 (patch) | |
tree | a61b29fc276146a323a37c1a8c19d1fa01ddeffb | |
parent | e81e53a0c1faf2b8f5fe8822d7218c91aeebea52 (diff) | |
download | postgresql-6eca8a5673307ce52f892f083df0b958d35f09e1.tar.gz postgresql-6eca8a5673307ce52f892f083df0b958d35f09e1.zip |
Last-minute updates for release notes.
Security: CVE-2024-7348
-rw-r--r-- | doc/src/sgml/release-15.sgml | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/doc/src/sgml/release-15.sgml b/doc/src/sgml/release-15.sgml index d5d96b3a6d0..d05b44a3cf8 100644 --- a/doc/src/sgml/release-15.sgml +++ b/doc/src/sgml/release-15.sgml @@ -35,6 +35,45 @@ <listitem> <!-- +Author: Masahiko Sawada <msawada@postgresql.org> +Branch: master [66e94448a] 2024-08-05 06:05:33 -0700 +Branch: REL_17_STABLE [fdf218f1d] 2024-08-05 06:05:30 -0700 +Branch: REL_16_STABLE [6aba85a4b] 2024-08-05 06:05:28 -0700 +Branch: REL_15_STABLE [e81e53a0c] 2024-08-05 06:05:25 -0700 +Branch: REL_14_STABLE [72ef1675e] 2024-08-05 06:05:23 -0700 +Branch: REL_13_STABLE [bbc94abf6] 2024-08-05 06:05:20 -0700 +Branch: REL_12_STABLE [79c7a7e29] 2024-08-05 06:05:17 -0700 +--> + <para> + Prevent unauthorized code execution + during <application>pg_dump</application> (Masahiko Sawada) + </para> + + <para> + An attacker able to create and drop non-temporary objects could + inject SQL code that would be executed by a + concurrent <application>pg_dump</application> session with the + privileges of the role running <application>pg_dump</application> + (which is often a superuser). The attack involves replacing a + sequence or similar object with a view or foreign table that will + execute malicious code. To prevent this, introduce a new server + parameter <varname>restrict_nonsystem_relation_kind</varname> that + can disable expansion of non-builtin views as well as access to + foreign tables, and teach <application>pg_dump</application> to set + it when available. Note that the attack is prevented only if + both <application>pg_dump</application> and the server it is dumping + from are new enough to have this fix. + </para> + + <para> + The <productname>PostgreSQL</productname> Project thanks + Noah Misch for reporting this problem. + (CVE-2024-7348) + </para> + </listitem> + + <listitem> +<!-- Author: Melanie Plageman <melanieplageman@gmail.com> Branch: master [83c39a1f7] 2024-07-19 12:04:00 -0400 Branch: REL_17_STABLE [fd4f12df5] 2024-07-19 12:12:03 -0400 |