Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit4295601

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2024-7348
1 parentbbc94ab commit4295601

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

‎doc/src/sgml/release-13.sgml

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,45 @@
3535

3636
<listitem>
3737
<!--
38+
Author: Masahiko Sawada <msawada@postgresql.org>
39+
Branch: master [66e94448a] 2024-08-05 06:05:33 -0700
40+
Branch: REL_17_STABLE [fdf218f1d] 2024-08-05 06:05:30 -0700
41+
Branch: REL_16_STABLE [6aba85a4b] 2024-08-05 06:05:28 -0700
42+
Branch: REL_15_STABLE [e81e53a0c] 2024-08-05 06:05:25 -0700
43+
Branch: REL_14_STABLE [72ef1675e] 2024-08-05 06:05:23 -0700
44+
Branch: REL_13_STABLE [bbc94abf6] 2024-08-05 06:05:20 -0700
45+
Branch: REL_12_STABLE [79c7a7e29] 2024-08-05 06:05:17 -0700
46+
-->
47+
<para>
48+
Prevent unauthorized code execution
49+
during <application>pg_dump</application> (Masahiko Sawada)
50+
</para>
51+
52+
<para>
53+
An attacker able to create and drop non-temporary objects could
54+
inject SQL code that would be executed by a
55+
concurrent <application>pg_dump</application> session with the
56+
privileges of the role running <application>pg_dump</application>
57+
(which is often a superuser). The attack involves replacing a
58+
sequence or similar object with a view or foreign table that will
59+
execute malicious code. To prevent this, introduce a new server
60+
parameter <varname>restrict_nonsystem_relation_kind</varname> that
61+
can disable expansion of non-builtin views as well as access to
62+
foreign tables, and teach <application>pg_dump</application> to set
63+
it when available. Note that the attack is prevented only if
64+
both <application>pg_dump</application> and the server it is dumping
65+
from are new enough to have this fix.
66+
</para>
67+
68+
<para>
69+
The <productname>PostgreSQL</productname> Project thanks
70+
Noah Misch for reporting this problem.
71+
(CVE-2024-7348)
72+
</para>
73+
</listitem>
74+
75+
<listitem>
76+
<!--
3877
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
3978
Branch: master [3dd637f3d] 2024-07-24 12:38:18 +0200
4079
Branch: REL_17_STABLE [2b22543a4] 2024-07-24 12:38:18 +0200

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp