aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/src/sgml/release-9.3.sgml28
-rw-r--r--doc/src/sgml/release-9.4.sgml28
2 files changed, 56 insertions, 0 deletions
diff --git a/doc/src/sgml/release-9.3.sgml b/doc/src/sgml/release-9.3.sgml
index a2078eac9ec..b0b46b4b394 100644
--- a/doc/src/sgml/release-9.3.sgml
+++ b/doc/src/sgml/release-9.3.sgml
@@ -41,6 +41,34 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely
diff --git a/doc/src/sgml/release-9.4.sgml b/doc/src/sgml/release-9.4.sgml
index 6568a934d4a..71b760a91a5 100644
--- a/doc/src/sgml/release-9.4.sgml
+++ b/doc/src/sgml/release-9.4.sgml
@@ -35,6 +35,34 @@
<listitem>
<para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
and <structfield>relminmxid</structfield> values
for <quote>nailed</quote> system catalogs are processed in a timely