File tree Expand file tree Collapse file tree 2 files changed +56
-0
lines changed Expand file tree Collapse file tree 2 files changed +56
-0
lines changed Original file line number Diff line number Diff line change 39
39
40
40
<itemizedlist>
41
41
42
+ <listitem>
43
+ <para>
44
+ Fix failure to reset <application>libpq</application>'s state fully
45
+ between connection attempts (Tom Lane)
46
+ </para>
47
+
48
+ <para>
49
+ An unprivileged user of <filename>dblink</filename>
50
+ or <filename>postgres_fdw</filename> could bypass the checks intended
51
+ to prevent use of server-side credentials, such as
52
+ a <filename>~/.pgpass</filename> file owned by the operating-system
53
+ user running the server. Servers allowing peer authentication on
54
+ local connections are particularly vulnerable. Other attacks such
55
+ as SQL injection into a <filename>postgres_fdw</filename> session
56
+ are also possible.
57
+ Attacking <filename>postgres_fdw</filename> in this way requires the
58
+ ability to create a foreign server object with selected connection
59
+ parameters, but any user with access to <filename>dblink</filename>
60
+ could exploit the problem.
61
+ In general, an attacker with the ability to select the connection
62
+ parameters for a <application>libpq</application>-using application
63
+ could cause mischief, though other plausible attack scenarios are
64
+ harder to think of.
65
+ Our thanks to Andrew Krasichkov for reporting this issue.
66
+ (CVE-2018-10915)
67
+ </para>
68
+ </listitem>
69
+
42
70
<listitem>
43
71
<para>
44
72
Ensure that updates to the <structfield>relfrozenxid</structfield>
Original file line number Diff line number Diff line change 33
33
34
34
<itemizedlist>
35
35
36
+ <listitem>
37
+ <para>
38
+ Fix failure to reset <application>libpq</application>'s state fully
39
+ between connection attempts (Tom Lane)
40
+ </para>
41
+
42
+ <para>
43
+ An unprivileged user of <filename>dblink</filename>
44
+ or <filename>postgres_fdw</filename> could bypass the checks intended
45
+ to prevent use of server-side credentials, such as
46
+ a <filename>~/.pgpass</filename> file owned by the operating-system
47
+ user running the server. Servers allowing peer authentication on
48
+ local connections are particularly vulnerable. Other attacks such
49
+ as SQL injection into a <filename>postgres_fdw</filename> session
50
+ are also possible.
51
+ Attacking <filename>postgres_fdw</filename> in this way requires the
52
+ ability to create a foreign server object with selected connection
53
+ parameters, but any user with access to <filename>dblink</filename>
54
+ could exploit the problem.
55
+ In general, an attacker with the ability to select the connection
56
+ parameters for a <application>libpq</application>-using application
57
+ could cause mischief, though other plausible attack scenarios are
58
+ harder to think of.
59
+ Our thanks to Andrew Krasichkov for reporting this issue.
60
+ (CVE-2018-10915)
61
+ </para>
62
+ </listitem>
63
+
36
64
<listitem>
37
65
<para>
38
66
Ensure that updates to the <structfield>relfrozenxid</structfield>
You can’t perform that action at this time.
0 commit comments