Skip to content

Commit ddc6917

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2021-23214, CVE-2021-23222
1 parent 30547d7 commit ddc6917

File tree

1 file changed

+85
-1
lines changed

1 file changed

+85
-1
lines changed

doc/src/sgml/release-14.sgml

Lines changed: 85 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, note that installations using physical replication should
2727
update standby servers before the primary server, as explained in
28-
the first changelog entry below.
28+
the third changelog entry below.
2929
</para>
3030

3131
<para>
@@ -43,6 +43,74 @@
4343

4444
<listitem>
4545
<!--
46+
Author: Tom Lane <tgl@sss.pgh.pa.us>
47+
Branch: master [28e241255] 2021-11-08 11:01:43 -0500
48+
Branch: REL_14_STABLE [9d5a76b8d] 2021-11-08 11:01:43 -0500
49+
Branch: REL_13_STABLE [e92ed93e8] 2021-11-08 11:01:43 -0500
50+
Branch: REL_12_STABLE [d1bd26740] 2021-11-08 11:01:43 -0500
51+
Branch: REL_11_STABLE [9394fb828] 2021-11-08 11:01:43 -0500
52+
Branch: REL_10_STABLE [9ae0f1112] 2021-11-08 11:01:43 -0500
53+
Branch: REL9_6_STABLE [046c2c846] 2021-11-08 11:01:43 -0500
54+
-->
55+
<para>
56+
Make the server reject extraneous data after an SSL or GSS
57+
encryption handshake (Tom Lane)
58+
</para>
59+
60+
<para>
61+
A man-in-the-middle with the ability to inject data into the TCP
62+
connection could stuff some cleartext data into the start of a
63+
supposedly encryption-protected database session.
64+
This could be abused to send faked SQL commands to the server,
65+
although that would only work if the server did not demand any
66+
authentication data. (However, a server relying on SSL certificate
67+
authentication might well not do so.)
68+
</para>
69+
70+
<para>
71+
The <productname>PostgreSQL</productname> Project thanks
72+
Jacob Champion for reporting this problem.
73+
(CVE-2021-23214)
74+
</para>
75+
</listitem>
76+
77+
<listitem>
78+
<!--
79+
Author: Tom Lane <tgl@sss.pgh.pa.us>
80+
Branch: master [160c02588] 2021-11-08 11:14:56 -0500
81+
Branch: REL_14_STABLE [30547d791] 2021-11-08 11:14:56 -0500
82+
Branch: REL_13_STABLE [844b31692] 2021-11-08 11:14:56 -0500
83+
Branch: REL_12_STABLE [36bb95ef2] 2021-11-08 11:14:56 -0500
84+
Branch: REL_11_STABLE [a021a1d2a] 2021-11-08 11:14:56 -0500
85+
Branch: REL_10_STABLE [e65d9c8cd] 2021-11-08 11:14:56 -0500
86+
Branch: REL9_6_STABLE [d83cdfdca] 2021-11-08 11:14:57 -0500
87+
-->
88+
<para>
89+
Make <application>libpq</application> reject extraneous data after
90+
an SSL or GSS encryption handshake (Tom Lane)
91+
</para>
92+
93+
<para>
94+
A man-in-the-middle with the ability to inject data into the TCP
95+
connection could stuff some cleartext data into the start of a
96+
supposedly encryption-protected database session.
97+
This could probably be abused to inject faked responses to the
98+
client's first few queries, although other details of libpq's
99+
behavior make that harder than it sounds. A different line of
100+
attack is to exfiltrate the client's password, or other sensitive
101+
data that might be sent early in the session. That has been shown
102+
to be possible with a server vulnerable to CVE-2021-23214.
103+
</para>
104+
105+
<para>
106+
The <productname>PostgreSQL</productname> Project thanks
107+
Jacob Champion for reporting this problem.
108+
(CVE-2021-23222)
109+
</para>
110+
</listitem>
111+
112+
<listitem>
113+
<!--
46114
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
47115
Branch: master [ff9f111bc] 2021-09-29 11:21:51 -0300
48116
Branch: REL_14_STABLE [64a8687a6] 2021-09-29 11:41:01 -0300
@@ -338,6 +406,22 @@ Branch: REL9_6_STABLE [0de8f9bc8] 2021-10-06 13:24:22 +0100
338406

339407
<listitem>
340408
<!--
409+
Author: David Rowley <drowley@postgresql.org>
410+
Branch: master [39a310567] 2021-11-08 14:40:33 +1300
411+
Branch: REL_14_STABLE [1f194ed6c] 2021-11-08 14:41:13 +1300
412+
-->
413+
<para>
414+
Avoid choosing the wrong hash equality operator for Memoize plans
415+
(David Rowley)
416+
</para>
417+
418+
<para>
419+
This error could result in crashes or incorrect query results.
420+
</para>
421+
</listitem>
422+
423+
<listitem>
424+
<!--
341425
Author: Tom Lane <tgl@sss.pgh.pa.us>
342426
Branch: master [4d5f651f1] 2021-10-14 12:43:55 -0400
343427
Branch: REL_14_STABLE [fd059ac2e] 2021-10-14 12:43:43 -0400

0 commit comments

Comments
 (0)