Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit402c3ba

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2021-23214,CVE-2021-23222
1 parent844b316 commit402c3ba

File tree

1 file changed

+69
-1
lines changed

1 file changed

+69
-1
lines changed

‎doc/src/sgml/release-13.sgml

Lines changed: 69 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, note that installations using physical replication should
2727
update standby servers before the primary server, as explained in
28-
thefirst changelog entry below.
28+
thethird changelog entry below.
2929
</para>
3030

3131
<para>
@@ -48,6 +48,74 @@
4848

4949
<listitem>
5050
<!--
51+
Author: Tom Lane <tgl@sss.pgh.pa.us>
52+
Branch: master [28e241255] 2021-11-08 11:01:43 -0500
53+
Branch: REL_14_STABLE [9d5a76b8d] 2021-11-08 11:01:43 -0500
54+
Branch: REL_13_STABLE [e92ed93e8] 2021-11-08 11:01:43 -0500
55+
Branch: REL_12_STABLE [d1bd26740] 2021-11-08 11:01:43 -0500
56+
Branch: REL_11_STABLE [9394fb828] 2021-11-08 11:01:43 -0500
57+
Branch: REL_10_STABLE [9ae0f1112] 2021-11-08 11:01:43 -0500
58+
Branch: REL9_6_STABLE [046c2c846] 2021-11-08 11:01:43 -0500
59+
-->
60+
<para>
61+
Make the server reject extraneous data after an SSL or GSS
62+
encryption handshake (Tom Lane)
63+
</para>
64+
65+
<para>
66+
A man-in-the-middle with the ability to inject data into the TCP
67+
connection could stuff some cleartext data into the start of a
68+
supposedly encryption-protected database session.
69+
This could be abused to send faked SQL commands to the server,
70+
although that would only work if the server did not demand any
71+
authentication data. (However, a server relying on SSL certificate
72+
authentication might well not do so.)
73+
</para>
74+
75+
<para>
76+
The <productname>PostgreSQL</productname> Project thanks
77+
Jacob Champion for reporting this problem.
78+
(CVE-2021-23214)
79+
</para>
80+
</listitem>
81+
82+
<listitem>
83+
<!--
84+
Author: Tom Lane <tgl@sss.pgh.pa.us>
85+
Branch: master [160c02588] 2021-11-08 11:14:56 -0500
86+
Branch: REL_14_STABLE [30547d791] 2021-11-08 11:14:56 -0500
87+
Branch: REL_13_STABLE [844b31692] 2021-11-08 11:14:56 -0500
88+
Branch: REL_12_STABLE [36bb95ef2] 2021-11-08 11:14:56 -0500
89+
Branch: REL_11_STABLE [a021a1d2a] 2021-11-08 11:14:56 -0500
90+
Branch: REL_10_STABLE [e65d9c8cd] 2021-11-08 11:14:56 -0500
91+
Branch: REL9_6_STABLE [d83cdfdca] 2021-11-08 11:14:57 -0500
92+
-->
93+
<para>
94+
Make <application>libpq</application> reject extraneous data after
95+
an SSL or GSS encryption handshake (Tom Lane)
96+
</para>
97+
98+
<para>
99+
A man-in-the-middle with the ability to inject data into the TCP
100+
connection could stuff some cleartext data into the start of a
101+
supposedly encryption-protected database session.
102+
This could probably be abused to inject faked responses to the
103+
client's first few queries, although other details of libpq's
104+
behavior make that harder than it sounds. A different line of
105+
attack is to exfiltrate the client's password, or other sensitive
106+
data that might be sent early in the session. That has been shown
107+
to be possible with a server vulnerable to CVE-2021-23214.
108+
</para>
109+
110+
<para>
111+
The <productname>PostgreSQL</productname> Project thanks
112+
Jacob Champion for reporting this problem.
113+
(CVE-2021-23222)
114+
</para>
115+
</listitem>
116+
117+
<listitem>
118+
<!--
51119
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
52120
Branch: master [ff9f111bc] 2021-09-29 11:21:51 -0300
53121
Branch: REL_14_STABLE [64a8687a6] 2021-09-29 11:41:01 -0300

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp