Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit2e19ad7

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2025-8713,CVE-2025-8714,CVE-2025-8715
1 parent8967c33 commit2e19ad7

File tree

1 file changed

+128
-1
lines changed

1 file changed

+128
-1
lines changed

‎doc/src/sgml/release-14.sgml‎

Lines changed: 128 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, if you have any
2727
BRIN <literal>numeric_minmax_multi_ops</literal> indexes, it is
28-
advisable to reindex them after updating. See thefirst changelog
28+
advisable to reindex them after updating. See thefourth changelog
2929
entry below.
3030
</para>
3131

@@ -42,6 +42,133 @@
4242

4343
<listitem>
4444
<!--
45+
Author: Dean Rasheed <dean.a.rasheed@gmail.com>
46+
Branch: master [22424953c] 2025-08-11 09:03:11 +0100
47+
Branch: REL_18_STABLE [64f77c6a6] 2025-08-11 09:07:36 +0100
48+
Branch: REL_17_STABLE [a85eddab2] 2025-08-11 09:09:12 +0100
49+
Branch: REL_16_STABLE [7e86da539] 2025-08-11 09:10:17 +0100
50+
Branch: REL_15_STABLE [415badc13] 2025-08-11 09:11:02 +0100
51+
Branch: REL_14_STABLE [afe38fb6a] 2025-08-11 09:12:09 +0100
52+
Branch: REL_13_STABLE [533211ded] 2025-08-11 09:13:20 +0100
53+
-->
54+
<para>
55+
Tighten security checks in planner estimation functions
56+
(Dean Rasheed)
57+
<ulink url="&commit_baseurl;afe38fb6a">&sect;</ulink>
58+
</para>
59+
60+
<para>
61+
The fix for CVE-2017-7484, plus followup fixes, intended to prevent
62+
leaky functions from being applied to statistics data for columns
63+
that the calling user does not have permission to read. Two gaps in
64+
that protection have been found. One gap applies to partitioning
65+
and inheritance hierarchies where RLS policies on the tables should
66+
restrict access to statistics data, but did not.
67+
</para>
68+
69+
<para>
70+
The other gap applies to cases where the query accesses a table via
71+
a view, and the view owner has permissions to read the underlying
72+
table but the calling user does not have permissions on the view.
73+
The view owner's permissions satisfied the security checks, and the
74+
leaky function would get applied to the underlying table's
75+
statistics before we check the calling user's permissions on the
76+
view. This has been fixed by making security checks on views occur
77+
at the start of planning. That might cause permissions failures to
78+
occur earlier than before.
79+
</para>
80+
81+
<para>
82+
The <productname>PostgreSQL</productname> Project thanks
83+
Dean Rasheed for reporting this problem.
84+
(CVE-2025-8713)
85+
</para>
86+
</listitem>
87+
88+
<listitem>
89+
<!--
90+
Author: Nathan Bossart <nathan@postgresql.org>
91+
Branch: master [71ea0d679] 2025-08-11 09:00:00 -0500
92+
Branch: REL_18_STABLE [67a2fbb8f] 2025-08-11 09:00:00 -0500
93+
Branch: REL_17_STABLE [575f54d4c] 2025-08-11 09:00:00 -0500
94+
Branch: REL_16_STABLE [7ad8e7909] 2025-08-11 09:00:00 -0500
95+
Branch: REL_15_STABLE [424040506] 2025-08-11 09:00:00 -0500
96+
Branch: REL_14_STABLE [e4998d089] 2025-08-11 09:00:00 -0500
97+
Branch: REL_13_STABLE [c204bd39f] 2025-08-11 09:00:00 -0500
98+
Branch: REL_14_STABLE [8967c33c6] 2025-08-11 12:37:00 -0500
99+
Branch: REL_13_STABLE [27d3dee68] 2025-08-11 12:37:00 -0500
100+
-->
101+
<para>
102+
Prevent <application>pg_dump</application> scripts from being used
103+
to attack the user running the restore (Nathan Bossart)
104+
<ulink url="&commit_baseurl;e4998d089">&sect;</ulink>
105+
<ulink url="&commit_baseurl;8967c33c6">&sect;</ulink>
106+
</para>
107+
108+
<para>
109+
Since dump/restore operations typically involve running SQL commands
110+
as superuser, the target database installation must trust the source
111+
server. However, it does not follow that the operating system user
112+
who executes <application>psql</application> to perform the restore
113+
should have to trust the source server. The risk here is that an
114+
attacker who has gained superuser-level control over the source
115+
server might be able to cause it to emit text that would be
116+
interpreted as <application>psql</application> meta-commands.
117+
That would provide shell-level access to the restoring user's own
118+
account, independently of access to the target database.
119+
</para>
120+
121+
<para>
122+
To provide a positive guarantee that this can't happen,
123+
extend <application>psql</application> with
124+
a <command>\restrict</command> command that prevents execution of
125+
further meta-commands, and teach <application>pg_dump</application>
126+
to issue that before any data coming from the source server.
127+
</para>
128+
129+
<para>
130+
The PostgreSQL Project thanks Martin Rakhmanov, Matthieu Denais, and
131+
RyotaK for reporting this problem.
132+
(CVE-2025-8714)
133+
</para>
134+
</listitem>
135+
136+
<listitem>
137+
<!--
138+
Author: Noah Misch <noah@leadboat.com>
139+
Branch: master [70693c645] 2025-08-11 06:18:59 -0700
140+
Branch: REL_18_STABLE [13a67ce60] 2025-08-11 06:19:03 -0700
141+
Branch: REL_17_STABLE [9b92f115b] 2025-08-11 06:19:03 -0700
142+
Branch: REL_16_STABLE [850caae60] 2025-08-11 06:19:03 -0700
143+
Branch: REL_15_STABLE [9751f934a] 2025-08-11 06:19:04 -0700
144+
Branch: REL_14_STABLE [0f5838438] 2025-08-11 06:19:04 -0700
145+
Branch: REL_13_STABLE [2179e6005] 2025-08-11 06:19:05 -0700
146+
-->
147+
<para>
148+
Convert newlines to spaces in names included in comments
149+
in <application>pg_dump</application> output
150+
(Noah Misch)
151+
<ulink url="&commit_baseurl;0f5838438">&sect;</ulink>
152+
</para>
153+
154+
<para>
155+
Object names containing newlines offered the ability to inject
156+
arbitrary SQL commands into the output script. (Without the
157+
preceding fix, injection of <application>psql</application>
158+
meta-commands would also be possible this way.)
159+
CVE-2012-0868 fixed this class of problem at the time, but later
160+
work reintroduced several cases.
161+
</para>
162+
163+
<para>
164+
The <productname>PostgreSQL</productname> Project thanks
165+
Noah Misch for reporting this problem.
166+
(CVE-2025-8715)
167+
</para>
168+
</listitem>
169+
170+
<listitem>
171+
<!--
45172
Author: Tom Lane <tgl@sss.pgh.pa.us>
46173
Branch: master [80c758a2e] 2025-08-05 16:51:10 -0400
47174
Branch: REL_18_STABLE [9b681e239] 2025-08-05 16:51:10 -0400

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp