diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2018-02-05 14:43:40 -0500 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2018-02-05 14:44:04 -0500 |
commit | cbe0dd581e7c7a815f6df6d849449225c902b17c (patch) | |
tree | 00d034755184aa9835f6425b5fefe5f639b700ee | |
parent | dc6fb453a33659c5b8e916c67121eba5d78c52b4 (diff) | |
download | postgresql-cbe0dd581e7c7a815f6df6d849449225c902b17c.tar.gz postgresql-cbe0dd581e7c7a815f6df6d849449225c902b17c.zip |
Last-minute updates for release notes.
Security: CVE-2018-1052, CVE-2018-1053
-rw-r--r-- | doc/src/sgml/release-10.sgml | 49 | ||||
-rw-r--r-- | doc/src/sgml/release-9.3.sgml | 22 | ||||
-rw-r--r-- | doc/src/sgml/release-9.4.sgml | 22 | ||||
-rw-r--r-- | doc/src/sgml/release-9.5.sgml | 22 | ||||
-rw-r--r-- | doc/src/sgml/release-9.6.sgml | 22 |
5 files changed, 137 insertions, 0 deletions
diff --git a/doc/src/sgml/release-10.sgml b/doc/src/sgml/release-10.sgml index 6d589e5d560..dbb1a9b2e6d 100644 --- a/doc/src/sgml/release-10.sgml +++ b/doc/src/sgml/release-10.sgml @@ -41,6 +41,55 @@ <listitem> <!-- +Author: Tom Lane <tgl@sss.pgh.pa.us> +Branch: master [3492a0af0] 2018-02-05 10:37:30 -0500 +Branch: REL_10_STABLE [fe921a360] 2018-02-05 10:37:30 -0500 +--> + <para> + Fix processing of partition keys containing multiple expressions + (Álvaro Herrera, David Rowley) + </para> + + <para> + This error led to crashes or, with carefully crafted input, disclosure + of arbitrary backend memory. + (CVE-2018-1052) + </para> + </listitem> + + <listitem> +<!-- +Author: Tom Lane <tgl@sss.pgh.pa.us> +Branch: master [a926eb84e] 2018-02-05 10:58:27 -0500 +Branch: REL_10_STABLE [6ba52aeb2] 2018-02-05 10:58:27 -0500 +Branch: REL9_6_STABLE [1341e017d] 2018-02-05 10:58:27 -0500 +Branch: REL9_5_STABLE [17aa02368] 2018-02-05 10:58:27 -0500 +Branch: REL9_4_STABLE [c3456208d] 2018-02-05 10:58:27 -0500 +Branch: REL9_3_STABLE [9c59e48a2] 2018-02-05 10:58:27 -0500 +--> + <para> + Ensure that all temporary files made + by <application>pg_upgrade</application> are non-world-readable + (Tom Lane, Noah Misch) + </para> + + <para> + <application>pg_upgrade</application> normally restricts its + temporary files to be readable and writable only by the calling user. + But the temporary file containing <literal>pg_dumpall -g</literal> + output would be group- or world-readable, or even writable, if the + user's <literal>umask</literal> setting allows. In typical usage on + multi-user machines, the <literal>umask</literal> and/or the working + directory's permissions would be tight enough to prevent problems; + but there may be people using <application>pg_upgrade</application> + in scenarios where this oversight would permit disclosure of database + passwords to unfriendly eyes. + (CVE-2018-1053) + </para> + </listitem> + + <listitem> +<!-- Author: Andres Freund <andres@anarazel.de> Branch: master [9c2f0a6c3] 2017-12-14 18:20:47 -0800 Branch: REL_10_STABLE [1224383e8] 2017-12-14 18:20:48 -0800 diff --git a/doc/src/sgml/release-9.3.sgml b/doc/src/sgml/release-9.3.sgml index e154e56992a..8ba84cb02dd 100644 --- a/doc/src/sgml/release-9.3.sgml +++ b/doc/src/sgml/release-9.3.sgml @@ -35,6 +35,28 @@ <listitem> <para> + Ensure that all temporary files made + by <application>pg_upgrade</application> are non-world-readable + (Tom Lane, Noah Misch) + </para> + + <para> + <application>pg_upgrade</application> normally restricts its + temporary files to be readable and writable only by the calling user. + But the temporary file containing <literal>pg_dumpall -g</literal> + output would be group- or world-readable, or even writable, if the + user's <literal>umask</literal> setting allows. In typical usage on + multi-user machines, the <literal>umask</literal> and/or the working + directory's permissions would be tight enough to prevent problems; + but there may be people using <application>pg_upgrade</application> + in scenarios where this oversight would permit disclosure of database + passwords to unfriendly eyes. + (CVE-2018-1053) + </para> + </listitem> + + <listitem> + <para> Fix vacuuming of tuples that were updated while key-share locked (Andres Freund, Álvaro Herrera) </para> diff --git a/doc/src/sgml/release-9.4.sgml b/doc/src/sgml/release-9.4.sgml index e1025b17f7b..def2daafd7d 100644 --- a/doc/src/sgml/release-9.4.sgml +++ b/doc/src/sgml/release-9.4.sgml @@ -35,6 +35,28 @@ <listitem> <para> + Ensure that all temporary files made + by <application>pg_upgrade</application> are non-world-readable + (Tom Lane, Noah Misch) + </para> + + <para> + <application>pg_upgrade</application> normally restricts its + temporary files to be readable and writable only by the calling user. + But the temporary file containing <literal>pg_dumpall -g</literal> + output would be group- or world-readable, or even writable, if the + user's <literal>umask</literal> setting allows. In typical usage on + multi-user machines, the <literal>umask</literal> and/or the working + directory's permissions would be tight enough to prevent problems; + but there may be people using <application>pg_upgrade</application> + in scenarios where this oversight would permit disclosure of database + passwords to unfriendly eyes. + (CVE-2018-1053) + </para> + </listitem> + + <listitem> + <para> Fix vacuuming of tuples that were updated while key-share locked (Andres Freund, Álvaro Herrera) </para> diff --git a/doc/src/sgml/release-9.5.sgml b/doc/src/sgml/release-9.5.sgml index ad3e6106d84..56de825ebbd 100644 --- a/doc/src/sgml/release-9.5.sgml +++ b/doc/src/sgml/release-9.5.sgml @@ -35,6 +35,28 @@ <listitem> <para> + Ensure that all temporary files made + by <application>pg_upgrade</application> are non-world-readable + (Tom Lane, Noah Misch) + </para> + + <para> + <application>pg_upgrade</application> normally restricts its + temporary files to be readable and writable only by the calling user. + But the temporary file containing <literal>pg_dumpall -g</literal> + output would be group- or world-readable, or even writable, if the + user's <literal>umask</literal> setting allows. In typical usage on + multi-user machines, the <literal>umask</literal> and/or the working + directory's permissions would be tight enough to prevent problems; + but there may be people using <application>pg_upgrade</application> + in scenarios where this oversight would permit disclosure of database + passwords to unfriendly eyes. + (CVE-2018-1053) + </para> + </listitem> + + <listitem> + <para> Fix vacuuming of tuples that were updated while key-share locked (Andres Freund, Álvaro Herrera) </para> diff --git a/doc/src/sgml/release-9.6.sgml b/doc/src/sgml/release-9.6.sgml index 81bfbaae14a..6b914b14c66 100644 --- a/doc/src/sgml/release-9.6.sgml +++ b/doc/src/sgml/release-9.6.sgml @@ -41,6 +41,28 @@ <listitem> <para> + Ensure that all temporary files made + by <application>pg_upgrade</application> are non-world-readable + (Tom Lane, Noah Misch) + </para> + + <para> + <application>pg_upgrade</application> normally restricts its + temporary files to be readable and writable only by the calling user. + But the temporary file containing <literal>pg_dumpall -g</literal> + output would be group- or world-readable, or even writable, if the + user's <literal>umask</literal> setting allows. In typical usage on + multi-user machines, the <literal>umask</literal> and/or the working + directory's permissions would be tight enough to prevent problems; + but there may be people using <application>pg_upgrade</application> + in scenarios where this oversight would permit disclosure of database + passwords to unfriendly eyes. + (CVE-2018-1053) + </para> + </listitem> + + <listitem> + <para> Fix vacuuming of tuples that were updated while key-share locked (Andres Freund, Álvaro Herrera) </para> |