diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2018-08-06 13:13:41 -0400 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2018-08-06 13:13:41 -0400 |
commit | cd2490789e82d9cc0cc5a23e666394f21d0b498f (patch) | |
tree | 7467cc1142053f8a00d156107e0ef1008031a348 | |
parent | 7aabfd1d8cdde37f36988344d0e1cf84aa164760 (diff) | |
download | postgresql-cd2490789e82d9cc0cc5a23e666394f21d0b498f.tar.gz postgresql-cd2490789e82d9cc0cc5a23e666394f21d0b498f.zip |
Last-minute updates for release notes.
Security: CVE-2018-10915, CVE-2018-10925
-rw-r--r-- | doc/src/sgml/release-9.3.sgml | 28 | ||||
-rw-r--r-- | doc/src/sgml/release-9.4.sgml | 28 | ||||
-rw-r--r-- | doc/src/sgml/release-9.5.sgml | 64 |
3 files changed, 105 insertions, 15 deletions
diff --git a/doc/src/sgml/release-9.3.sgml b/doc/src/sgml/release-9.3.sgml index a2078eac9ec..b0b46b4b394 100644 --- a/doc/src/sgml/release-9.3.sgml +++ b/doc/src/sgml/release-9.3.sgml @@ -41,6 +41,34 @@ <listitem> <para> + Fix failure to reset <application>libpq</application>'s state fully + between connection attempts (Tom Lane) + </para> + + <para> + An unprivileged user of <filename>dblink</filename> + or <filename>postgres_fdw</filename> could bypass the checks intended + to prevent use of server-side credentials, such as + a <filename>~/.pgpass</filename> file owned by the operating-system + user running the server. Servers allowing peer authentication on + local connections are particularly vulnerable. Other attacks such + as SQL injection into a <filename>postgres_fdw</filename> session + are also possible. + Attacking <filename>postgres_fdw</filename> in this way requires the + ability to create a foreign server object with selected connection + parameters, but any user with access to <filename>dblink</filename> + could exploit the problem. + In general, an attacker with the ability to select the connection + parameters for a <application>libpq</application>-using application + could cause mischief, though other plausible attack scenarios are + harder to think of. + Our thanks to Andrew Krasichkov for reporting this issue. + (CVE-2018-10915) + </para> + </listitem> + + <listitem> + <para> Ensure that updates to the <structfield>relfrozenxid</structfield> and <structfield>relminmxid</structfield> values for <quote>nailed</quote> system catalogs are processed in a timely diff --git a/doc/src/sgml/release-9.4.sgml b/doc/src/sgml/release-9.4.sgml index 6568a934d4a..71b760a91a5 100644 --- a/doc/src/sgml/release-9.4.sgml +++ b/doc/src/sgml/release-9.4.sgml @@ -35,6 +35,34 @@ <listitem> <para> + Fix failure to reset <application>libpq</application>'s state fully + between connection attempts (Tom Lane) + </para> + + <para> + An unprivileged user of <filename>dblink</filename> + or <filename>postgres_fdw</filename> could bypass the checks intended + to prevent use of server-side credentials, such as + a <filename>~/.pgpass</filename> file owned by the operating-system + user running the server. Servers allowing peer authentication on + local connections are particularly vulnerable. Other attacks such + as SQL injection into a <filename>postgres_fdw</filename> session + are also possible. + Attacking <filename>postgres_fdw</filename> in this way requires the + ability to create a foreign server object with selected connection + parameters, but any user with access to <filename>dblink</filename> + could exploit the problem. + In general, an attacker with the ability to select the connection + parameters for a <application>libpq</application>-using application + could cause mischief, though other plausible attack scenarios are + harder to think of. + Our thanks to Andrew Krasichkov for reporting this issue. + (CVE-2018-10915) + </para> + </listitem> + + <listitem> + <para> Ensure that updates to the <structfield>relfrozenxid</structfield> and <structfield>relminmxid</structfield> values for <quote>nailed</quote> system catalogs are processed in a timely diff --git a/doc/src/sgml/release-9.5.sgml b/doc/src/sgml/release-9.5.sgml index 11a219ac5cc..1f5ce819f43 100644 --- a/doc/src/sgml/release-9.5.sgml +++ b/doc/src/sgml/release-9.5.sgml @@ -35,6 +35,55 @@ <listitem> <para> + Fix failure to reset <application>libpq</application>'s state fully + between connection attempts (Tom Lane) + </para> + + <para> + An unprivileged user of <filename>dblink</filename> + or <filename>postgres_fdw</filename> could bypass the checks intended + to prevent use of server-side credentials, such as + a <filename>~/.pgpass</filename> file owned by the operating-system + user running the server. Servers allowing peer authentication on + local connections are particularly vulnerable. Other attacks such + as SQL injection into a <filename>postgres_fdw</filename> session + are also possible. + Attacking <filename>postgres_fdw</filename> in this way requires the + ability to create a foreign server object with selected connection + parameters, but any user with access to <filename>dblink</filename> + could exploit the problem. + In general, an attacker with the ability to select the connection + parameters for a <application>libpq</application>-using application + could cause mischief, though other plausible attack scenarios are + harder to think of. + Our thanks to Andrew Krasichkov for reporting this issue. + (CVE-2018-10915) + </para> + </listitem> + + <listitem> + <para> + Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view + that isn't just <literal>SELECT * FROM ...</literal> + (Dean Rasheed, Amit Langote) + </para> + + <para> + Erroneous expansion of an updatable view could lead to crashes + or <quote>attribute ... has the wrong type</quote> errors, if the + view's <literal>SELECT</literal> list doesn't match one-to-one with + the underlying table's columns. + Furthermore, this bug could be leveraged to allow updates of columns + that an attacking user lacks <literal>UPDATE</literal> privilege for, + if that user has <literal>INSERT</literal> and <literal>UPDATE</literal> + privileges for some other column(s) of the table. + Any user could also use it for disclosure of server memory. + (CVE-2018-10925) + </para> + </listitem> + + <listitem> + <para> Ensure that updates to the <structfield>relfrozenxid</structfield> and <structfield>relminmxid</structfield> values for <quote>nailed</quote> system catalogs are processed in a timely @@ -142,21 +191,6 @@ <listitem> <para> - Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view - that isn't just <literal>SELECT * FROM ...</literal> - (Dean Rasheed, Amit Langote) - </para> - - <para> - Erroneous expansion of an updatable view could lead to crashes - or <quote>attribute ... has the wrong type</quote> errors, if the - view's <literal>SELECT</literal> list doesn't match one-to-one with - the underlying table's columns. - </para> - </listitem> - - <listitem> - <para> Ensure a table's cached index list is correctly rebuilt after an index creation fails partway through (Peter Geoghegan) </para> |