aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2018-08-06 13:13:41 -0400
committerTom Lane <tgl@sss.pgh.pa.us>2018-08-06 13:13:41 -0400
commit9d3072d2db2edbc19603d8d65189a504cc4e4712 (patch)
tree8b6c7da2237e5d9fbe08dd52a6e6519584fa03f4
parentab5400469b5db281a4d804ef59b80fcef7c9fc93 (diff)
downloadpostgresql-9d3072d2db2edbc19603d8d65189a504cc4e4712.tar.gz
postgresql-9d3072d2db2edbc19603d8d65189a504cc4e4712.zip
Last-minute updates for release notes.
Security: CVE-2018-10915, CVE-2018-10925
-rw-r--r--doc/src/sgml/release-10.sgml90
-rw-r--r--doc/src/sgml/release-9.3.sgml28
-rw-r--r--doc/src/sgml/release-9.4.sgml28
-rw-r--r--doc/src/sgml/release-9.5.sgml64
-rw-r--r--doc/src/sgml/release-9.6.sgml64
5 files changed, 221 insertions, 53 deletions
diff --git a/doc/src/sgml/release-10.sgml b/doc/src/sgml/release-10.sgml
index ba0839d8ec9..968ed866c2b 100644
--- a/doc/src/sgml/release-10.sgml
+++ b/doc/src/sgml/release-10.sgml
@@ -35,6 +35,73 @@
<listitem>
<!--
+Author: Tom Lane <tgl@sss.pgh.pa.us>
+Branch: master [d1c6a14ba] 2018-08-06 10:53:35 -0400
+Branch: REL_11_STABLE [f6f735f78] 2018-08-06 10:53:35 -0400
+Branch: REL_10_STABLE [ab5400469] 2018-08-06 10:53:35 -0400
+Branch: REL9_6_STABLE [a8094d0fe] 2018-08-06 10:53:35 -0400
+Branch: REL9_5_STABLE [7aabfd1d8] 2018-08-06 10:53:35 -0400
+Branch: REL9_4_STABLE [6de9766b8] 2018-08-06 10:53:35 -0400
+Branch: REL9_3_STABLE [243de06be] 2018-08-06 10:53:35 -0400
+-->
+ <para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+<!--
+Author: Tom Lane <tgl@sss.pgh.pa.us>
+Branch: master [b8a1247a3] 2018-08-04 19:38:58 -0400
+Branch: REL_11_STABLE [e7154b6ac] 2018-08-04 19:38:58 -0400
+Branch: REL_10_STABLE [f6a124d01] 2018-08-04 19:38:58 -0400
+Branch: REL9_6_STABLE [b484bffe7] 2018-08-04 19:38:58 -0400
+Branch: REL9_5_STABLE [5ad143cda] 2018-08-04 19:38:59 -0400
+-->
+ <para>
+ Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
+ that isn't just <literal>SELECT * FROM ...</literal>
+ (Dean Rasheed, Amit Langote)
+ </para>
+
+ <para>
+ Erroneous expansion of an updatable view could lead to crashes
+ or <quote>attribute ... has the wrong type</quote> errors, if the
+ view's <literal>SELECT</literal> list doesn't match one-to-one with
+ the underlying table's columns.
+ Furthermore, this bug could be leveraged to allow updates of columns
+ that an attacking user lacks <literal>UPDATE</literal> privilege for,
+ if that user has <literal>INSERT</literal> and <literal>UPDATE</literal>
+ privileges for some other column(s) of the table.
+ Any user could also use it for disclosure of server memory.
+ (CVE-2018-10925)
+ </para>
+ </listitem>
+
+ <listitem>
+<!--
Author: Andres Freund <andres@anarazel.de>
Branch: master Release: REL_11_BR [a54e1f158] 2018-06-12 11:13:21 -0700
Branch: REL_10_STABLE [2ce64caaf] 2018-06-12 11:13:21 -0700
@@ -260,29 +327,6 @@ Branch: REL_10_STABLE [4beb25c63] 2018-07-16 17:55:13 -0400
<listitem>
<!--
-Author: Tom Lane <tgl@sss.pgh.pa.us>
-Branch: master [b8a1247a3] 2018-08-04 19:38:58 -0400
-Branch: REL_11_STABLE [e7154b6ac] 2018-08-04 19:38:58 -0400
-Branch: REL_10_STABLE [f6a124d01] 2018-08-04 19:38:58 -0400
-Branch: REL9_6_STABLE [b484bffe7] 2018-08-04 19:38:58 -0400
-Branch: REL9_5_STABLE [5ad143cda] 2018-08-04 19:38:59 -0400
--->
- <para>
- Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
- that isn't just <literal>SELECT * FROM ...</literal>
- (Dean Rasheed, Amit Langote)
- </para>
-
- <para>
- Erroneous expansion of an updatable view could lead to crashes
- or <quote>attribute ... has the wrong type</quote> errors, if the
- view's <literal>SELECT</literal> list doesn't match one-to-one with
- the underlying table's columns.
- </para>
- </listitem>
-
- <listitem>
-<!--
Author: Peter Geoghegan <pg@bowt.ie>
Branch: master [b3f919da0] 2018-08-03 15:11:31 -0700
Branch: REL_11_STABLE [b9612e5cf] 2018-08-03 14:45:02 -0700
diff --git a/doc/src/sgml/release-9.3.sgml b/doc/src/sgml/release-9.3.sgml
index 9e06e052e26..8d5cfdb8b7b 100644
--- a/doc/src/sgml/release-9.3.sgml
+++ b/doc/src/sgml/release-9.3.sgml
@@ -41,6 +41,34 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely
diff --git a/doc/src/sgml/release-9.4.sgml b/doc/src/sgml/release-9.4.sgml
index 8333c4354f9..adf4f175221 100644
--- a/doc/src/sgml/release-9.4.sgml
+++ b/doc/src/sgml/release-9.4.sgml
@@ -35,6 +35,34 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely
diff --git a/doc/src/sgml/release-9.5.sgml b/doc/src/sgml/release-9.5.sgml
index 79927c823b8..9512e6e6ccb 100644
--- a/doc/src/sgml/release-9.5.sgml
+++ b/doc/src/sgml/release-9.5.sgml
@@ -35,6 +35,55 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
+ Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
+ that isn't just <literal>SELECT * FROM ...</literal>
+ (Dean Rasheed, Amit Langote)
+ </para>
+
+ <para>
+ Erroneous expansion of an updatable view could lead to crashes
+ or <quote>attribute ... has the wrong type</quote> errors, if the
+ view's <literal>SELECT</literal> list doesn't match one-to-one with
+ the underlying table's columns.
+ Furthermore, this bug could be leveraged to allow updates of columns
+ that an attacking user lacks <literal>UPDATE</literal> privilege for,
+ if that user has <literal>INSERT</literal> and <literal>UPDATE</literal>
+ privileges for some other column(s) of the table.
+ Any user could also use it for disclosure of server memory.
+ (CVE-2018-10925)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely
@@ -142,21 +191,6 @@
<listitem>
<para>
- Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
- that isn't just <literal>SELECT * FROM ...</literal>
- (Dean Rasheed, Amit Langote)
- </para>
-
- <para>
- Erroneous expansion of an updatable view could lead to crashes
- or <quote>attribute ... has the wrong type</quote> errors, if the
- view's <literal>SELECT</literal> list doesn't match one-to-one with
- the underlying table's columns.
- </para>
- </listitem>
-
- <listitem>
- <para>
Ensure a table's cached index list is correctly rebuilt after an index
creation fails partway through (Peter Geoghegan)
</para>
diff --git a/doc/src/sgml/release-9.6.sgml b/doc/src/sgml/release-9.6.sgml
index 15734d6f7dc..9a5446a355e 100644
--- a/doc/src/sgml/release-9.6.sgml
+++ b/doc/src/sgml/release-9.6.sgml
@@ -35,6 +35,55 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
+ Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
+ that isn't just <literal>SELECT * FROM ...</literal>
+ (Dean Rasheed, Amit Langote)
+ </para>
+
+ <para>
+ Erroneous expansion of an updatable view could lead to crashes
+ or <quote>attribute ... has the wrong type</quote> errors, if the
+ view's <literal>SELECT</literal> list doesn't match one-to-one with
+ the underlying table's columns.
+ Furthermore, this bug could be leveraged to allow updates of columns
+ that an attacking user lacks <literal>UPDATE</literal> privilege for,
+ if that user has <literal>INSERT</literal> and <literal>UPDATE</literal>
+ privileges for some other column(s) of the table.
+ Any user could also use it for disclosure of server memory.
+ (CVE-2018-10925)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely
@@ -142,21 +191,6 @@
<listitem>
<para>
- Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
- that isn't just <literal>SELECT * FROM ...</literal>
- (Dean Rasheed, Amit Langote)
- </para>
-
- <para>
- Erroneous expansion of an updatable view could lead to crashes
- or <quote>attribute ... has the wrong type</quote> errors, if the
- view's <literal>SELECT</literal> list doesn't match one-to-one with
- the underlying table's columns.
- </para>
- </listitem>
-
- <listitem>
- <para>
Ensure a table's cached index list is correctly rebuilt after an index
creation fails partway through (Peter Geoghegan)
</para>