|
35 | 35 |
|
36 | 36 | <listitem>
|
37 | 37 | <!--
|
| 38 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 39 | +Branch: master [d1c6a14ba] 2018-08-06 10:53:35 -0400 |
| 40 | +Branch: REL_11_STABLE [f6f735f78] 2018-08-06 10:53:35 -0400 |
| 41 | +Branch: REL_10_STABLE [ab5400469] 2018-08-06 10:53:35 -0400 |
| 42 | +Branch: REL9_6_STABLE [a8094d0fe] 2018-08-06 10:53:35 -0400 |
| 43 | +Branch: REL9_5_STABLE [7aabfd1d8] 2018-08-06 10:53:35 -0400 |
| 44 | +Branch: REL9_4_STABLE [6de9766b8] 2018-08-06 10:53:35 -0400 |
| 45 | +Branch: REL9_3_STABLE [243de06be] 2018-08-06 10:53:35 -0400 |
| 46 | +--> |
| 47 | + <para> |
| 48 | + Fix failure to reset <application>libpq</application>'s state fully |
| 49 | + between connection attempts (Tom Lane) |
| 50 | + </para> |
| 51 | + |
| 52 | + <para> |
| 53 | + An unprivileged user of <filename>dblink</filename> |
| 54 | + or <filename>postgres_fdw</filename> could bypass the checks intended |
| 55 | + to prevent use of server-side credentials, such as |
| 56 | + a <filename>~/.pgpass</filename> file owned by the operating-system |
| 57 | + user running the server. Servers allowing peer authentication on |
| 58 | + local connections are particularly vulnerable. Other attacks such |
| 59 | + as SQL injection into a <filename>postgres_fdw</filename> session |
| 60 | + are also possible. |
| 61 | + Attacking <filename>postgres_fdw</filename> in this way requires the |
| 62 | + ability to create a foreign server object with selected connection |
| 63 | + parameters, but any user with access to <filename>dblink</filename> |
| 64 | + could exploit the problem. |
| 65 | + In general, an attacker with the ability to select the connection |
| 66 | + parameters for a <application>libpq</application>-using application |
| 67 | + could cause mischief, though other plausible attack scenarios are |
| 68 | + harder to think of. |
| 69 | + Our thanks to Andrew Krasichkov for reporting this issue. |
| 70 | + (CVE-2018-10915) |
| 71 | + </para> |
| 72 | + </listitem> |
| 73 | + |
| 74 | + <listitem> |
| 75 | +<!-- |
| 76 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 77 | +Branch: master [b8a1247a3] 2018-08-04 19:38:58 -0400 |
| 78 | +Branch: REL_11_STABLE [e7154b6ac] 2018-08-04 19:38:58 -0400 |
| 79 | +Branch: REL_10_STABLE [f6a124d01] 2018-08-04 19:38:58 -0400 |
| 80 | +Branch: REL9_6_STABLE [b484bffe7] 2018-08-04 19:38:58 -0400 |
| 81 | +Branch: REL9_5_STABLE [5ad143cda] 2018-08-04 19:38:59 -0400 |
| 82 | +--> |
| 83 | + <para> |
| 84 | + Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view |
| 85 | + that isn't just <literal>SELECT * FROM ...</literal> |
| 86 | + (Dean Rasheed, Amit Langote) |
| 87 | + </para> |
| 88 | + |
| 89 | + <para> |
| 90 | + Erroneous expansion of an updatable view could lead to crashes |
| 91 | + or <quote>attribute ... has the wrong type</quote> errors, if the |
| 92 | + view's <literal>SELECT</literal> list doesn't match one-to-one with |
| 93 | + the underlying table's columns. |
| 94 | + Furthermore, this bug could be leveraged to allow updates of columns |
| 95 | + that an attacking user lacks <literal>UPDATE</literal> privilege for, |
| 96 | + if that user has <literal>INSERT</literal> and <literal>UPDATE</literal> |
| 97 | + privileges for some other column(s) of the table. |
| 98 | + Any user could also use it for disclosure of server memory. |
| 99 | + (CVE-2018-10925) |
| 100 | + </para> |
| 101 | + </listitem> |
| 102 | + |
| 103 | + <listitem> |
| 104 | +<!-- |
38 | 105 | Author: Andres Freund <andres@anarazel.de>
|
39 | 106 | Branch: master Release: REL_11_BR [a54e1f158] 2018-06-12 11:13:21 -0700
|
40 | 107 | Branch: REL_10_STABLE [2ce64caaf] 2018-06-12 11:13:21 -0700
|
@@ -260,29 +327,6 @@ Branch: REL_10_STABLE [4beb25c63] 2018-07-16 17:55:13 -0400
|
260 | 327 |
|
261 | 328 | <listitem>
|
262 | 329 | <!--
|
263 |
| -Author: Tom Lane <tgl@sss.pgh.pa.us> |
264 |
| -Branch: master [b8a1247a3] 2018-08-04 19:38:58 -0400 |
265 |
| -Branch: REL_11_STABLE [e7154b6ac] 2018-08-04 19:38:58 -0400 |
266 |
| -Branch: REL_10_STABLE [f6a124d01] 2018-08-04 19:38:58 -0400 |
267 |
| -Branch: REL9_6_STABLE [b484bffe7] 2018-08-04 19:38:58 -0400 |
268 |
| -Branch: REL9_5_STABLE [5ad143cda] 2018-08-04 19:38:59 -0400 |
269 |
| ---> |
270 |
| - <para> |
271 |
| - Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view |
272 |
| - that isn't just <literal>SELECT * FROM ...</literal> |
273 |
| - (Dean Rasheed, Amit Langote) |
274 |
| - </para> |
275 |
| - |
276 |
| - <para> |
277 |
| - Erroneous expansion of an updatable view could lead to crashes |
278 |
| - or <quote>attribute ... has the wrong type</quote> errors, if the |
279 |
| - view's <literal>SELECT</literal> list doesn't match one-to-one with |
280 |
| - the underlying table's columns. |
281 |
| - </para> |
282 |
| - </listitem> |
283 |
| - |
284 |
| - <listitem> |
285 |
| -<!-- |
286 | 330 | Author: Peter Geoghegan <pg@bowt.ie>
|
287 | 331 | Branch: master [b3f919da0] 2018-08-03 15:11:31 -0700
|
288 | 332 | Branch: REL_11_STABLE [b9612e5cf] 2018-08-03 14:45:02 -0700
|
|
0 commit comments