|
41 | 41 |
|
42 | 42 | <listitem>
|
43 | 43 | <!--
|
| 44 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 45 | +Branch: master [3b0776fde] 2023-11-06 10:38:00 -0500 |
| 46 | +Branch: REL_16_STABLE [d3d1e2509] 2023-11-06 10:38:00 -0500 |
| 47 | +Branch: REL_15_STABLE [4f4a422fb] 2023-11-06 10:38:00 -0500 |
| 48 | +Branch: REL_14_STABLE [9146d0d65] 2023-11-06 10:38:00 -0500 |
| 49 | +Branch: REL_13_STABLE [d3de70fdb] 2023-11-06 10:38:00 -0500 |
| 50 | +Branch: REL_12_STABLE [e911afd09] 2023-11-06 10:38:00 -0500 |
| 51 | +Branch: REL_11_STABLE [8c6633f4d] 2023-11-06 10:38:00 -0500 |
| 52 | +--> |
| 53 | + <para> |
| 54 | + Fix handling of unknown-type arguments |
| 55 | + in <literal>DISTINCT</literal> <type>"any"</type> aggregate |
| 56 | + functions (Tom Lane) |
| 57 | + </para> |
| 58 | + |
| 59 | + <para> |
| 60 | + This error led to a <type>text</type>-type value being interpreted |
| 61 | + as an <type>unknown</type>-type value (that is, a zero-terminated |
| 62 | + string) at runtime. This could result in disclosure of server |
| 63 | + memory following the <type>text</type> value. |
| 64 | + </para> |
| 65 | + |
| 66 | + <para> |
| 67 | + The <productname>PostgreSQL</productname> Project thanks Jingzhou Fu |
| 68 | + for reporting this problem. |
| 69 | + (CVE-2023-5868) |
| 70 | + </para> |
| 71 | + </listitem> |
| 72 | + |
| 73 | + <listitem> |
| 74 | +<!-- |
| 75 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 76 | +Branch: master [18b585155] 2023-11-06 10:56:43 -0500 |
| 77 | +Branch: REL_16_STABLE [e24daa94b] 2023-11-06 10:56:43 -0500 |
| 78 | +Branch: REL_15_STABLE [3bc6bc3ee] 2023-11-06 10:56:43 -0500 |
| 79 | +Branch: REL_14_STABLE [edc0a8d82] 2023-11-06 10:56:43 -0500 |
| 80 | +Branch: REL_13_STABLE [26c599beb] 2023-11-06 10:56:43 -0500 |
| 81 | +Branch: REL_12_STABLE [d267cea24] 2023-11-06 10:56:43 -0500 |
| 82 | +Branch: REL_11_STABLE [c48008f59] 2023-11-06 10:56:43 -0500 |
| 83 | +--> |
| 84 | + <para> |
| 85 | + Detect integer overflow while computing new array dimensions |
| 86 | + (Tom Lane) |
| 87 | + </para> |
| 88 | + |
| 89 | + <para> |
| 90 | + When assigning new elements to array subscripts that are outside the |
| 91 | + current array bounds, an undetected integer overflow could occur in |
| 92 | + edge cases. Memory stomps that are potentially exploitable for |
| 93 | + arbitrary code execution are possible, and so is disclosure of |
| 94 | + server memory. |
| 95 | + </para> |
| 96 | + |
| 97 | + <para> |
| 98 | + The <productname>PostgreSQL</productname> Project thanks Pedro |
| 99 | + Gallegos for reporting this problem. |
| 100 | + (CVE-2023-5869) |
| 101 | + </para> |
| 102 | + </listitem> |
| 103 | + |
| 104 | + <listitem> |
| 105 | +<!-- |
| 106 | +Author: Noah Misch <noah@leadboat.com> |
| 107 | +Branch: master [3a9b18b30] 2023-11-06 06:14:13 -0800 |
| 108 | +Branch: REL_16_STABLE [785412731] 2023-11-06 06:14:16 -0800 |
| 109 | +Branch: REL_15_STABLE [595c988c9] 2023-11-06 06:14:16 -0800 |
| 110 | +Branch: REL_14_STABLE [508acb901] 2023-11-06 06:14:17 -0800 |
| 111 | +Branch: REL_13_STABLE [28b609550] 2023-11-06 06:14:17 -0800 |
| 112 | +Branch: REL_12_STABLE [2893f2f40] 2023-11-06 06:14:17 -0800 |
| 113 | +Branch: REL_11_STABLE [e082734c8] 2023-11-06 06:14:18 -0800 |
| 114 | +Author: Noah Misch <noah@leadboat.com> |
| 115 | +Branch: master [b72de09a1] 2023-11-06 06:14:13 -0800 |
| 116 | +Branch: REL_16_STABLE [2c3c5ec49] 2023-11-06 06:14:16 -0800 |
| 117 | +Branch: REL_15_STABLE [fbc371909] 2023-11-06 06:14:16 -0800 |
| 118 | +Branch: REL_14_STABLE [ecd5d240c] 2023-11-06 06:14:17 -0800 |
| 119 | +Branch: REL_13_STABLE [2c7a2a00a] 2023-11-06 06:14:17 -0800 |
| 120 | +Branch: REL_12_STABLE [7bbf4d037] 2023-11-06 06:14:17 -0800 |
| 121 | +Branch: REL_11_STABLE [a27be40c1] 2023-11-06 06:14:18 -0800 |
| 122 | +--> |
| 123 | + <para> |
| 124 | + Prevent the <literal>pg_signal_backend</literal> role from |
| 125 | + signalling background workers and autovacuum processes |
| 126 | + (Noah Misch, Jelte Fennema-Nio) |
| 127 | + </para> |
| 128 | + |
| 129 | + <para> |
| 130 | + The documentation says that <literal>pg_signal_backend</literal> |
| 131 | + cannot issue signals to superuser-owned processes. It was able to |
| 132 | + signal these background processes, though, because they advertise a |
| 133 | + role OID of zero. Treat that as indicating superuser ownership. |
| 134 | + The security implications of cancelling one of these process types |
| 135 | + are fairly small so far as the core code goes (we'll just start |
| 136 | + another one), but extensions might add background workers that are |
| 137 | + more vulnerable. |
| 138 | + </para> |
| 139 | + |
| 140 | + <para> |
| 141 | + Also ensure that the <varname>is_superuser</varname> parameter is |
| 142 | + set correctly in such processes. No specific security consequences |
| 143 | + are known for that oversight, but it might be significant for some |
| 144 | + extensions. |
| 145 | + </para> |
| 146 | + |
| 147 | + <para> |
| 148 | + The <productname>PostgreSQL</productname> Project thanks |
| 149 | + Hemanth Sandrana and Mahendrakar Srinivasarao |
| 150 | + for reporting this problem. |
| 151 | + (CVE-2023-5870) |
| 152 | + </para> |
| 153 | + </listitem> |
| 154 | + |
| 155 | + <listitem> |
| 156 | +<!-- |
44 | 157 | Author: David Rowley <drowley@postgresql.org>
|
45 | 158 | Branch: master [d9e46dfb7] 2023-10-13 01:12:31 +1300
|
46 | 159 | Branch: REL_16_STABLE [595db9e9c] 2023-10-13 01:13:07 +1300
|
|
0 commit comments