Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commita4e4418

Browse files
committed
Last-minute updates for release notes.
Security:CVE-2019-10164
1 parentbf94911 commita4e4418

File tree

1 file changed

+37
-14
lines changed

1 file changed

+37
-14
lines changed

‎doc/src/sgml/release-11.sgml

Lines changed: 37 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,43 @@
3535

3636
<listitem>
3737
<!--
38+
Author: Michael Paquier <michael@paquier.xyz>
39+
Branch: master [09ec55b93] 2019-06-17 21:48:17 +0900
40+
Branch: REL_11_STABLE [4c779ce32] 2019-06-17 21:48:25 +0900
41+
Branch: REL_10_STABLE [90adc16ea] 2019-06-17 21:48:34 +0900
42+
Author: Michael Paquier <michael@paquier.xyz>
43+
Branch: master [b67421178] 2019-06-17 22:13:57 +0900
44+
Branch: REL_11_STABLE [27c464e42] 2019-06-17 22:14:04 +0900
45+
Branch: REL_10_STABLE [d72a7e4da] 2019-06-17 22:14:09 +0900
46+
-->
47+
<para>
48+
Fix buffer-overflow hazards in SCRAM verifier parsing
49+
(Jonathan Katz, Heikki Linnakangas, Michael Paquier)
50+
</para>
51+
52+
<para>
53+
Any authenticated user could cause a stack-based buffer overflow by
54+
changing their own password to a purpose-crafted value. In addition
55+
to the ability to crash the <productname>PostgreSQL</productname>
56+
server, this could suffice for executing arbitrary code as
57+
the <productname>PostgreSQL</productname> operating system account.
58+
</para>
59+
60+
<para>
61+
A similar overflow hazard existed
62+
in <application>libpq</application>, which could allow a rogue
63+
server to crash a client or perhaps execute arbitrary code as the
64+
client's operating system account.
65+
</para>
66+
67+
<para>
68+
The <productname>PostgreSQL</productname> Project thanks Alexander
69+
Lakhin for reporting this problem. (CVE-2019-10164)
70+
</para>
71+
</listitem>
72+
73+
<listitem>
74+
<!--
3875
Author: Tom Lane <tgl@sss.pgh.pa.us>
3976
Branch: master [6630ccad7] 2019-05-17 19:44:34 -0400
4077
Branch: REL_11_STABLE [592d5d75b] 2019-05-17 19:44:19 -0400
@@ -128,20 +165,6 @@ Branch: REL_11_STABLE [9fea0b0e2] 2019-05-19 18:16:41 -0700
128165

129166
<listitem>
130167
<!--
131-
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
132-
Branch: master [de87a084c] 2019-06-13 17:28:24 -0400
133-
Branch: REL_11_STABLE [85600b7b5] 2019-06-13 17:28:24 -0400
134-
Branch: REL_10_STABLE [14a91a8fc] 2019-06-13 17:28:24 -0400
135-
Branch: REL9_6_STABLE [cb2398d80] 2019-06-13 17:28:24 -0400
136-
-->
137-
<para>
138-
Avoid spurious deadlock failures when upgrading a tuple lock (Oleksii
139-
Kliukin)
140-
</para>
141-
</listitem>
142-
143-
<listitem>
144-
<!--
145168
Author: Tom Lane <tgl@sss.pgh.pa.us>
146169
Branch: master [24c19e9f6] 2019-05-09 16:53:05 -0400
147170
Branch: REL_11_STABLE [e7eed0baa] 2019-05-09 16:52:49 -0400

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp