Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitddc6917

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2021-23214,CVE-2021-23222
1 parent30547d7 commitddc6917

File tree

1 file changed

+85
-1
lines changed

1 file changed

+85
-1
lines changed

‎doc/src/sgml/release-14.sgml

Lines changed: 85 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, note that installations using physical replication should
2727
update standby servers before the primary server, as explained in
28-
thefirst changelog entry below.
28+
thethird changelog entry below.
2929
</para>
3030

3131
<para>
@@ -43,6 +43,74 @@
4343

4444
<listitem>
4545
<!--
46+
Author: Tom Lane <tgl@sss.pgh.pa.us>
47+
Branch: master [28e241255] 2021-11-08 11:01:43 -0500
48+
Branch: REL_14_STABLE [9d5a76b8d] 2021-11-08 11:01:43 -0500
49+
Branch: REL_13_STABLE [e92ed93e8] 2021-11-08 11:01:43 -0500
50+
Branch: REL_12_STABLE [d1bd26740] 2021-11-08 11:01:43 -0500
51+
Branch: REL_11_STABLE [9394fb828] 2021-11-08 11:01:43 -0500
52+
Branch: REL_10_STABLE [9ae0f1112] 2021-11-08 11:01:43 -0500
53+
Branch: REL9_6_STABLE [046c2c846] 2021-11-08 11:01:43 -0500
54+
-->
55+
<para>
56+
Make the server reject extraneous data after an SSL or GSS
57+
encryption handshake (Tom Lane)
58+
</para>
59+
60+
<para>
61+
A man-in-the-middle with the ability to inject data into the TCP
62+
connection could stuff some cleartext data into the start of a
63+
supposedly encryption-protected database session.
64+
This could be abused to send faked SQL commands to the server,
65+
although that would only work if the server did not demand any
66+
authentication data. (However, a server relying on SSL certificate
67+
authentication might well not do so.)
68+
</para>
69+
70+
<para>
71+
The <productname>PostgreSQL</productname> Project thanks
72+
Jacob Champion for reporting this problem.
73+
(CVE-2021-23214)
74+
</para>
75+
</listitem>
76+
77+
<listitem>
78+
<!--
79+
Author: Tom Lane <tgl@sss.pgh.pa.us>
80+
Branch: master [160c02588] 2021-11-08 11:14:56 -0500
81+
Branch: REL_14_STABLE [30547d791] 2021-11-08 11:14:56 -0500
82+
Branch: REL_13_STABLE [844b31692] 2021-11-08 11:14:56 -0500
83+
Branch: REL_12_STABLE [36bb95ef2] 2021-11-08 11:14:56 -0500
84+
Branch: REL_11_STABLE [a021a1d2a] 2021-11-08 11:14:56 -0500
85+
Branch: REL_10_STABLE [e65d9c8cd] 2021-11-08 11:14:56 -0500
86+
Branch: REL9_6_STABLE [d83cdfdca] 2021-11-08 11:14:57 -0500
87+
-->
88+
<para>
89+
Make <application>libpq</application> reject extraneous data after
90+
an SSL or GSS encryption handshake (Tom Lane)
91+
</para>
92+
93+
<para>
94+
A man-in-the-middle with the ability to inject data into the TCP
95+
connection could stuff some cleartext data into the start of a
96+
supposedly encryption-protected database session.
97+
This could probably be abused to inject faked responses to the
98+
client's first few queries, although other details of libpq's
99+
behavior make that harder than it sounds. A different line of
100+
attack is to exfiltrate the client's password, or other sensitive
101+
data that might be sent early in the session. That has been shown
102+
to be possible with a server vulnerable to CVE-2021-23214.
103+
</para>
104+
105+
<para>
106+
The <productname>PostgreSQL</productname> Project thanks
107+
Jacob Champion for reporting this problem.
108+
(CVE-2021-23222)
109+
</para>
110+
</listitem>
111+
112+
<listitem>
113+
<!--
46114
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
47115
Branch: master [ff9f111bc] 2021-09-29 11:21:51 -0300
48116
Branch: REL_14_STABLE [64a8687a6] 2021-09-29 11:41:01 -0300
@@ -338,6 +406,22 @@ Branch: REL9_6_STABLE [0de8f9bc8] 2021-10-06 13:24:22 +0100
338406

339407
<listitem>
340408
<!--
409+
Author: David Rowley <drowley@postgresql.org>
410+
Branch: master [39a310567] 2021-11-08 14:40:33 +1300
411+
Branch: REL_14_STABLE [1f194ed6c] 2021-11-08 14:41:13 +1300
412+
-->
413+
<para>
414+
Avoid choosing the wrong hash equality operator for Memoize plans
415+
(David Rowley)
416+
</para>
417+
418+
<para>
419+
This error could result in crashes or incorrect query results.
420+
</para>
421+
</listitem>
422+
423+
<listitem>
424+
<!--
341425
Author: Tom Lane <tgl@sss.pgh.pa.us>
342426
Branch: master [4d5f651f1] 2021-10-14 12:43:55 -0400
343427
Branch: REL_14_STABLE [fd059ac2e] 2021-10-14 12:43:43 -0400

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp