Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitef2950f

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2023-5868,CVE-2023-5869,CVE-2023-5870
1 parentedc0a8d commitef2950f

File tree

1 file changed

+114
-1
lines changed

1 file changed

+114
-1
lines changed

‎doc/src/sgml/release-14.sgml

Lines changed: 114 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
certain types of indexes yielding wrong search results or being
2828
unnecessarily inefficient. It is advisable
2929
to <command>REINDEX</command> potentially-affected indexes after
30-
installing this update. See thefirst throughfourth changelog
30+
installing this update. See thefourth throughseventh changelog
3131
entries below.
3232
</para>
3333

@@ -44,6 +44,119 @@
4444

4545
<listitem>
4646
<!--
47+
Author: Tom Lane <tgl@sss.pgh.pa.us>
48+
Branch: master [3b0776fde] 2023-11-06 10:38:00 -0500
49+
Branch: REL_16_STABLE [d3d1e2509] 2023-11-06 10:38:00 -0500
50+
Branch: REL_15_STABLE [4f4a422fb] 2023-11-06 10:38:00 -0500
51+
Branch: REL_14_STABLE [9146d0d65] 2023-11-06 10:38:00 -0500
52+
Branch: REL_13_STABLE [d3de70fdb] 2023-11-06 10:38:00 -0500
53+
Branch: REL_12_STABLE [e911afd09] 2023-11-06 10:38:00 -0500
54+
Branch: REL_11_STABLE [8c6633f4d] 2023-11-06 10:38:00 -0500
55+
-->
56+
<para>
57+
Fix handling of unknown-type arguments
58+
in <literal>DISTINCT</literal> <type>"any"</type> aggregate
59+
functions (Tom Lane)
60+
</para>
61+
62+
<para>
63+
This error led to a <type>text</type>-type value being interpreted
64+
as an <type>unknown</type>-type value (that is, a zero-terminated
65+
string) at runtime. This could result in disclosure of server
66+
memory following the <type>text</type> value.
67+
</para>
68+
69+
<para>
70+
The <productname>PostgreSQL</productname> Project thanks Jingzhou Fu
71+
for reporting this problem.
72+
(CVE-2023-5868)
73+
</para>
74+
</listitem>
75+
76+
<listitem>
77+
<!--
78+
Author: Tom Lane <tgl@sss.pgh.pa.us>
79+
Branch: master [18b585155] 2023-11-06 10:56:43 -0500
80+
Branch: REL_16_STABLE [e24daa94b] 2023-11-06 10:56:43 -0500
81+
Branch: REL_15_STABLE [3bc6bc3ee] 2023-11-06 10:56:43 -0500
82+
Branch: REL_14_STABLE [edc0a8d82] 2023-11-06 10:56:43 -0500
83+
Branch: REL_13_STABLE [26c599beb] 2023-11-06 10:56:43 -0500
84+
Branch: REL_12_STABLE [d267cea24] 2023-11-06 10:56:43 -0500
85+
Branch: REL_11_STABLE [c48008f59] 2023-11-06 10:56:43 -0500
86+
-->
87+
<para>
88+
Detect integer overflow while computing new array dimensions
89+
(Tom Lane)
90+
</para>
91+
92+
<para>
93+
When assigning new elements to array subscripts that are outside the
94+
current array bounds, an undetected integer overflow could occur in
95+
edge cases. Memory stomps that are potentially exploitable for
96+
arbitrary code execution are possible, and so is disclosure of
97+
server memory.
98+
</para>
99+
100+
<para>
101+
The <productname>PostgreSQL</productname> Project thanks Pedro
102+
Gallegos for reporting this problem.
103+
(CVE-2023-5869)
104+
</para>
105+
</listitem>
106+
107+
<listitem>
108+
<!--
109+
Author: Noah Misch <noah@leadboat.com>
110+
Branch: master [3a9b18b30] 2023-11-06 06:14:13 -0800
111+
Branch: REL_16_STABLE [785412731] 2023-11-06 06:14:16 -0800
112+
Branch: REL_15_STABLE [595c988c9] 2023-11-06 06:14:16 -0800
113+
Branch: REL_14_STABLE [508acb901] 2023-11-06 06:14:17 -0800
114+
Branch: REL_13_STABLE [28b609550] 2023-11-06 06:14:17 -0800
115+
Branch: REL_12_STABLE [2893f2f40] 2023-11-06 06:14:17 -0800
116+
Branch: REL_11_STABLE [e082734c8] 2023-11-06 06:14:18 -0800
117+
Author: Noah Misch <noah@leadboat.com>
118+
Branch: master [b72de09a1] 2023-11-06 06:14:13 -0800
119+
Branch: REL_16_STABLE [2c3c5ec49] 2023-11-06 06:14:16 -0800
120+
Branch: REL_15_STABLE [fbc371909] 2023-11-06 06:14:16 -0800
121+
Branch: REL_14_STABLE [ecd5d240c] 2023-11-06 06:14:17 -0800
122+
Branch: REL_13_STABLE [2c7a2a00a] 2023-11-06 06:14:17 -0800
123+
Branch: REL_12_STABLE [7bbf4d037] 2023-11-06 06:14:17 -0800
124+
Branch: REL_11_STABLE [a27be40c1] 2023-11-06 06:14:18 -0800
125+
-->
126+
<para>
127+
Prevent the <literal>pg_signal_backend</literal> role from
128+
signalling background workers and autovacuum processes
129+
(Noah Misch, Jelte Fennema-Nio)
130+
</para>
131+
132+
<para>
133+
The documentation says that <literal>pg_signal_backend</literal>
134+
cannot issue signals to superuser-owned processes. It was able to
135+
signal these background processes, though, because they advertise a
136+
role OID of zero. Treat that as indicating superuser ownership.
137+
The security implications of cancelling one of these process types
138+
are fairly small so far as the core code goes (we'll just start
139+
another one), but extensions might add background workers that are
140+
more vulnerable.
141+
</para>
142+
143+
<para>
144+
Also ensure that the <varname>is_superuser</varname> parameter is
145+
set correctly in such processes. No specific security consequences
146+
are known for that oversight, but it might be significant for some
147+
extensions.
148+
</para>
149+
150+
<para>
151+
The <productname>PostgreSQL</productname> Project thanks
152+
Hemanth Sandrana and Mahendrakar Srinivasarao
153+
for reporting this problem.
154+
(CVE-2023-5870)
155+
</para>
156+
</listitem>
157+
158+
<listitem>
159+
<!--
47160
Author: Heikki Linnakangas <heikki.linnakangas@iki.fi>
48161
Branch: master [28d3c2ddc] 2023-09-26 14:14:49 +0300
49162
Branch: REL_16_STABLE [d7f521325] 2023-09-26 14:15:01 +0300

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp