Skip to content

Commit 3dbb3dd

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2023-5868, CVE-2023-5869, CVE-2023-5870
1 parent c48008f commit 3dbb3dd

File tree

1 file changed

+113
-0
lines changed

1 file changed

+113
-0
lines changed

doc/src/sgml/release-11.sgml

Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,119 @@
4141

4242
<listitem>
4343
<!--
44+
Author: Tom Lane <tgl@sss.pgh.pa.us>
45+
Branch: master [3b0776fde] 2023-11-06 10:38:00 -0500
46+
Branch: REL_16_STABLE [d3d1e2509] 2023-11-06 10:38:00 -0500
47+
Branch: REL_15_STABLE [4f4a422fb] 2023-11-06 10:38:00 -0500
48+
Branch: REL_14_STABLE [9146d0d65] 2023-11-06 10:38:00 -0500
49+
Branch: REL_13_STABLE [d3de70fdb] 2023-11-06 10:38:00 -0500
50+
Branch: REL_12_STABLE [e911afd09] 2023-11-06 10:38:00 -0500
51+
Branch: REL_11_STABLE [8c6633f4d] 2023-11-06 10:38:00 -0500
52+
-->
53+
<para>
54+
Fix handling of unknown-type arguments
55+
in <literal>DISTINCT</literal> <type>"any"</type> aggregate
56+
functions (Tom Lane)
57+
</para>
58+
59+
<para>
60+
This error led to a <type>text</type>-type value being interpreted
61+
as an <type>unknown</type>-type value (that is, a zero-terminated
62+
string) at runtime. This could result in disclosure of server
63+
memory following the <type>text</type> value.
64+
</para>
65+
66+
<para>
67+
The <productname>PostgreSQL</productname> Project thanks Jingzhou Fu
68+
for reporting this problem.
69+
(CVE-2023-5868)
70+
</para>
71+
</listitem>
72+
73+
<listitem>
74+
<!--
75+
Author: Tom Lane <tgl@sss.pgh.pa.us>
76+
Branch: master [18b585155] 2023-11-06 10:56:43 -0500
77+
Branch: REL_16_STABLE [e24daa94b] 2023-11-06 10:56:43 -0500
78+
Branch: REL_15_STABLE [3bc6bc3ee] 2023-11-06 10:56:43 -0500
79+
Branch: REL_14_STABLE [edc0a8d82] 2023-11-06 10:56:43 -0500
80+
Branch: REL_13_STABLE [26c599beb] 2023-11-06 10:56:43 -0500
81+
Branch: REL_12_STABLE [d267cea24] 2023-11-06 10:56:43 -0500
82+
Branch: REL_11_STABLE [c48008f59] 2023-11-06 10:56:43 -0500
83+
-->
84+
<para>
85+
Detect integer overflow while computing new array dimensions
86+
(Tom Lane)
87+
</para>
88+
89+
<para>
90+
When assigning new elements to array subscripts that are outside the
91+
current array bounds, an undetected integer overflow could occur in
92+
edge cases. Memory stomps that are potentially exploitable for
93+
arbitrary code execution are possible, and so is disclosure of
94+
server memory.
95+
</para>
96+
97+
<para>
98+
The <productname>PostgreSQL</productname> Project thanks Pedro
99+
Gallegos for reporting this problem.
100+
(CVE-2023-5869)
101+
</para>
102+
</listitem>
103+
104+
<listitem>
105+
<!--
106+
Author: Noah Misch <noah@leadboat.com>
107+
Branch: master [3a9b18b30] 2023-11-06 06:14:13 -0800
108+
Branch: REL_16_STABLE [785412731] 2023-11-06 06:14:16 -0800
109+
Branch: REL_15_STABLE [595c988c9] 2023-11-06 06:14:16 -0800
110+
Branch: REL_14_STABLE [508acb901] 2023-11-06 06:14:17 -0800
111+
Branch: REL_13_STABLE [28b609550] 2023-11-06 06:14:17 -0800
112+
Branch: REL_12_STABLE [2893f2f40] 2023-11-06 06:14:17 -0800
113+
Branch: REL_11_STABLE [e082734c8] 2023-11-06 06:14:18 -0800
114+
Author: Noah Misch <noah@leadboat.com>
115+
Branch: master [b72de09a1] 2023-11-06 06:14:13 -0800
116+
Branch: REL_16_STABLE [2c3c5ec49] 2023-11-06 06:14:16 -0800
117+
Branch: REL_15_STABLE [fbc371909] 2023-11-06 06:14:16 -0800
118+
Branch: REL_14_STABLE [ecd5d240c] 2023-11-06 06:14:17 -0800
119+
Branch: REL_13_STABLE [2c7a2a00a] 2023-11-06 06:14:17 -0800
120+
Branch: REL_12_STABLE [7bbf4d037] 2023-11-06 06:14:17 -0800
121+
Branch: REL_11_STABLE [a27be40c1] 2023-11-06 06:14:18 -0800
122+
-->
123+
<para>
124+
Prevent the <literal>pg_signal_backend</literal> role from
125+
signalling background workers and autovacuum processes
126+
(Noah Misch, Jelte Fennema-Nio)
127+
</para>
128+
129+
<para>
130+
The documentation says that <literal>pg_signal_backend</literal>
131+
cannot issue signals to superuser-owned processes. It was able to
132+
signal these background processes, though, because they advertise a
133+
role OID of zero. Treat that as indicating superuser ownership.
134+
The security implications of cancelling one of these process types
135+
are fairly small so far as the core code goes (we'll just start
136+
another one), but extensions might add background workers that are
137+
more vulnerable.
138+
</para>
139+
140+
<para>
141+
Also ensure that the <varname>is_superuser</varname> parameter is
142+
set correctly in such processes. No specific security consequences
143+
are known for that oversight, but it might be significant for some
144+
extensions.
145+
</para>
146+
147+
<para>
148+
The <productname>PostgreSQL</productname> Project thanks
149+
Hemanth Sandrana and Mahendrakar Srinivasarao
150+
for reporting this problem.
151+
(CVE-2023-5870)
152+
</para>
153+
</listitem>
154+
155+
<listitem>
156+
<!--
44157
Author: David Rowley <drowley@postgresql.org>
45158
Branch: master [d9e46dfb7] 2023-10-13 01:12:31 +1300
46159
Branch: REL_16_STABLE [595db9e9c] 2023-10-13 01:13:07 +1300

0 commit comments

Comments
 (0)