|
23 | 23 | </para>
|
24 | 24 |
|
25 | 25 | <para>
|
26 |
| - However, if you use BRIN indexes, see the first changelog entry below. |
| 26 | + However, if you use BRIN indexes, see the fourth changelog entry below. |
27 | 27 | </para>
|
28 | 28 | </sect2>
|
29 | 29 |
|
|
34 | 34 |
|
35 | 35 | <listitem>
|
36 | 36 | <!--
|
| 37 | +Author: Dean Rasheed <dean.a.rasheed@gmail.com> |
| 38 | +Branch: master [87b2ebd35] 2017-11-06 09:19:22 +0000 |
| 39 | +Branch: REL_10_STABLE [3f8089572] 2017-11-06 09:17:44 +0000 |
| 40 | +Branch: REL9_6_STABLE [1f23d1cd2] 2017-11-06 09:16:24 +0000 |
| 41 | +Branch: REL9_5_STABLE [045a18888] 2017-11-06 09:15:11 +0000 |
| 42 | +--> |
| 43 | + <para> |
| 44 | + Ensure that <literal>INSERT ... ON CONFLICT DO UPDATE</literal> checks |
| 45 | + table permissions and RLS policies in all cases (Dean Rasheed) |
| 46 | + </para> |
| 47 | + |
| 48 | + <para> |
| 49 | + The update path of <literal>INSERT ... ON CONFLICT DO UPDATE</literal> |
| 50 | + requires <literal>SELECT</literal> permission on the columns of the |
| 51 | + arbiter index, but it failed to check for that in the case of an |
| 52 | + arbiter specified by constraint name. |
| 53 | + In addition, for a table with row level security enabled, it failed to |
| 54 | + check updated rows against the table's <literal>SELECT</literal> |
| 55 | + policies (regardless of how the arbiter index was specified). |
| 56 | + (CVE-2017-15099) |
| 57 | + </para> |
| 58 | + </listitem> |
| 59 | + |
| 60 | + <listitem> |
| 61 | +<!-- |
| 62 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 63 | +Branch: master [b57422871] 2017-11-06 10:29:37 -0500 |
| 64 | +Branch: REL_10_STABLE [c30f082d2] 2017-11-06 10:29:38 -0500 |
| 65 | +Branch: REL9_6_STABLE [38e825632] 2017-11-06 10:29:39 -0500 |
| 66 | +Branch: REL9_5_STABLE [d5fe5fb23] 2017-11-06 10:29:40 -0500 |
| 67 | +Branch: REL9_4_STABLE [70846ee05] 2017-11-06 10:29:41 -0500 |
| 68 | +Branch: REL9_3_STABLE [c0c8807de] 2017-11-06 10:29:42 -0500 |
| 69 | +--> |
| 70 | + <para> |
| 71 | + Fix crash due to rowtype mismatch |
| 72 | + in <function>json{b}_populate_recordset()</function> |
| 73 | + (Michael Paquier, Tom Lane) |
| 74 | + </para> |
| 75 | + |
| 76 | + <para> |
| 77 | + These functions used the result rowtype specified in the <literal>FROM |
| 78 | + ... AS</literal> clause without checking that it matched the actual |
| 79 | + rowtype of the supplied tuple value. If it didn't, that would usually |
| 80 | + result in a crash, though disclosure of server memory contents seems |
| 81 | + possible as well. |
| 82 | + (CVE-2017-15098) |
| 83 | + </para> |
| 84 | + </listitem> |
| 85 | + |
| 86 | + <listitem> |
| 87 | +<!-- |
| 88 | +Author: Noah Misch <noah@leadboat.com> |
| 89 | +Branch: master [dfc015dcf] 2017-11-06 07:11:10 -0800 |
| 90 | +Branch: REL_10_STABLE [6b0b983f7] 2017-11-06 07:11:13 -0800 |
| 91 | +Branch: REL9_6_STABLE [b7d6f7507] 2017-11-06 07:11:13 -0800 |
| 92 | +Branch: REL9_5_STABLE [ed546dd06] 2017-11-06 07:11:13 -0800 |
| 93 | +Branch: REL9_4_STABLE [29d067051] 2017-11-06 07:11:13 -0800 |
| 94 | +Branch: REL9_3_STABLE [b50029768] 2017-11-06 07:11:13 -0800 |
| 95 | +Branch: REL9_2_STABLE [eda780281] 2017-11-06 07:11:13 -0800 |
| 96 | +--> |
| 97 | + <para> |
| 98 | + Fix sample server-start scripts to become <literal>$PGUSER</literal> |
| 99 | + before opening <literal>$PGLOG</literal> (Noah Misch) |
| 100 | + </para> |
| 101 | + |
| 102 | + <para> |
| 103 | + Previously, the postmaster log file was opened while still running as |
| 104 | + root. The database owner could therefore mount an attack against |
| 105 | + another system user by making <literal>$PGLOG</literal> be a symbolic |
| 106 | + link to some other file, which would then become corrupted by appending |
| 107 | + log messages. |
| 108 | + </para> |
| 109 | + |
| 110 | + <para> |
| 111 | + By default, these scripts are not installed anywhere. Users who have |
| 112 | + made use of them will need to manually recopy them, or apply the same |
| 113 | + changes to their modified versions. If the |
| 114 | + existing <literal>$PGLOG</literal> file is root-owned, it will need to |
| 115 | + be removed or renamed out of the way before restarting the server with |
| 116 | + the corrected script. |
| 117 | + (CVE-2017-12172) |
| 118 | + </para> |
| 119 | + </listitem> |
| 120 | + |
| 121 | + <listitem> |
| 122 | +<!-- |
37 | 123 | Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
|
38 | 124 | Branch: master [ec42a1dcb] 2017-11-03 17:23:13 +0100
|
39 | 125 | Branch: REL_10_STABLE [37a856567] 2017-11-03 17:23:13 +0100
|
@@ -595,6 +681,26 @@ Branch: REL9_3_STABLE [deb429b51] 2017-11-03 12:40:42 +0100
|
595 | 681 |
|
596 | 682 | <listitem>
|
597 | 683 | <!--
|
| 684 | +Author: Noah Misch <noah@leadboat.com> |
| 685 | +Branch: master [c66b438db] 2017-11-05 18:51:08 -0800 |
| 686 | +Branch: REL_10_STABLE [937f67800] 2017-11-05 18:51:15 -0800 |
| 687 | +Branch: REL9_6_STABLE [971983f42] 2017-11-05 18:52:38 -0800 |
| 688 | +Branch: REL9_5_STABLE [014c5cd87] 2017-11-05 18:54:52 -0800 |
| 689 | +--> |
| 690 | + <para> |
| 691 | + Fix missing temp-install prerequisites |
| 692 | + for <literal>check</literal>-like Make targets (Noah Misch) |
| 693 | + </para> |
| 694 | + |
| 695 | + <para> |
| 696 | + Some non-default test procedures that are meant to work |
| 697 | + like <literal>make check</literal> failed to ensure that the temporary |
| 698 | + installation was up to date. |
| 699 | + </para> |
| 700 | + </listitem> |
| 701 | + |
| 702 | + <listitem> |
| 703 | +<!-- |
598 | 704 | Author: Tom Lane <tgl@sss.pgh.pa.us>
|
599 | 705 | Branch: master [8df4ce1ea] 2017-10-23 18:15:36 -0400
|
600 | 706 | Branch: REL_10_STABLE [0cde56247] 2017-10-23 18:15:42 -0400
|
|
0 commit comments