|
30 | 30 |
|
31 | 31 | <listitem>
|
32 | 32 | <!--
|
| 33 | +Author: Noah Misch <noah@leadboat.com> |
| 34 | +Branch: master [0c3185e96] 2020-11-09 07:32:09 -0800 |
| 35 | +Branch: REL_13_STABLE [c90c84b3f] 2020-11-09 07:32:12 -0800 |
| 36 | +Branch: REL_12_STABLE [ac8f6243c] 2020-11-09 07:32:12 -0800 |
| 37 | +Branch: REL_11_STABLE [43ebfea5a] 2020-11-09 07:32:13 -0800 |
| 38 | +Branch: REL_10_STABLE [f97ecea1e] 2020-11-09 07:32:13 -0800 |
| 39 | +Branch: REL9_6_STABLE [ff3de4c21] 2020-11-09 07:32:13 -0800 |
| 40 | +Branch: REL9_5_STABLE [aefc625de] 2020-11-09 07:32:14 -0800 |
| 41 | +--> |
| 42 | + <para> |
| 43 | + Block <command>DECLARE CURSOR ... WITH HOLD</command> and firing of |
| 44 | + deferred triggers within index expressions and materialized view |
| 45 | + queries (Noah Misch) |
| 46 | + </para> |
| 47 | + |
| 48 | + <para> |
| 49 | + This is essentially a leak in the <quote>security restricted |
| 50 | + operation</quote> sandbox mechanism. An attacker having permission |
| 51 | + to create non-temporary SQL objects could parlay this leak to |
| 52 | + execute arbitrary SQL code as a superuser. |
| 53 | + </para> |
| 54 | + |
| 55 | + <para> |
| 56 | + The <productname>PostgreSQL</productname> Project thanks |
| 57 | + Etienne Stalmans for reporting this problem. |
| 58 | + (CVE-2020-25695) |
| 59 | + </para> |
| 60 | + </listitem> |
| 61 | + |
| 62 | + <listitem> |
| 63 | +<!-- |
| 64 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 65 | +Branch: master [a45bc8a4f] 2020-09-24 18:19:38 -0400 |
| 66 | +Branch: REL_13_STABLE [cb8885ac4] 2020-09-24 18:19:38 -0400 |
| 67 | +Branch: REL_12_STABLE [fb93f784f] 2020-09-24 18:19:38 -0400 |
| 68 | +Branch: REL_11_STABLE [1738a61c8] 2020-09-24 18:19:39 -0400 |
| 69 | +Branch: REL_10_STABLE [1888ff8d0] 2020-09-24 18:19:39 -0400 |
| 70 | +Branch: REL9_6_STABLE [7c154f2fd] 2020-09-24 18:19:39 -0400 |
| 71 | +Branch: REL9_5_STABLE [56b46d3a1] 2020-09-24 18:19:39 -0400 |
| 72 | +Branch: master [8e5793ab6] 2020-10-19 19:03:46 -0400 |
| 73 | +Branch: REL_13_STABLE [1814f915b] 2020-10-19 19:03:46 -0400 |
| 74 | +Branch: REL_12_STABLE [c6d0b9b16] 2020-10-19 19:03:46 -0400 |
| 75 | +Branch: REL_11_STABLE [5a9f99bed] 2020-10-19 19:03:47 -0400 |
| 76 | +Branch: REL_10_STABLE [68f236993] 2020-10-19 19:03:47 -0400 |
| 77 | +Branch: REL9_6_STABLE [5c78f7977] 2020-10-19 19:03:47 -0400 |
| 78 | +Branch: REL9_5_STABLE [da129a04a] 2020-10-19 19:03:47 -0400 |
| 79 | +--> |
| 80 | + <para> |
| 81 | + Fix usage of complex connection-string parameters |
| 82 | + in <application>pg_dump</application>, |
| 83 | + <application>pg_restore</application>, |
| 84 | + <application>clusterdb</application>, |
| 85 | + <application>reindexdb</application>, |
| 86 | + and <application>vacuumdb</application> (Tom Lane) |
| 87 | + </para> |
| 88 | + |
| 89 | + <para> |
| 90 | + The <option>-d</option> parameter |
| 91 | + of <application>pg_dump</application> |
| 92 | + and <application>pg_restore</application>, or |
| 93 | + the <option>--maintenance-db</option> parameter of the other |
| 94 | + programs mentioned, can be a <quote>connection string</quote> |
| 95 | + containing multiple connection parameters rather than just a |
| 96 | + database name. In cases where these programs need to initiate |
| 97 | + additional connections, such as parallel processing or processing of |
| 98 | + multiple databases, the connection string was forgotten and just the |
| 99 | + basic connection parameters (database name, host, port, and |
| 100 | + username) were used for the additional connections. This could lead |
| 101 | + to connection failures if the connection string included any other |
| 102 | + essential information, such as non-default SSL or GSS parameters. |
| 103 | + Worse, the connection might succeed but not be encrypted as |
| 104 | + intended, or be vulnerable to man-in-the-middle attacks that the |
| 105 | + intended connection parameters would have prevented. |
| 106 | + (CVE-2020-25694) |
| 107 | + </para> |
| 108 | + </listitem> |
| 109 | + |
| 110 | + <listitem> |
| 111 | +<!-- |
| 112 | +Author: Tom Lane <tgl@sss.pgh.pa.us> |
| 113 | +Branch: master [85c54287a] 2020-10-21 16:19:00 -0400 |
| 114 | +Branch: REL_13_STABLE [2e4af4110] 2020-10-21 16:19:00 -0400 |
| 115 | +Branch: REL_12_STABLE [f656517ec] 2020-10-21 16:19:01 -0400 |
| 116 | +Branch: REL_11_STABLE [20be76d5c] 2020-10-21 16:19:01 -0400 |
| 117 | +Branch: REL_10_STABLE [8175da6e7] 2020-10-21 16:19:02 -0400 |
| 118 | +Branch: REL9_6_STABLE [870a23230] 2020-10-21 16:18:41 -0400 |
| 119 | +Branch: REL9_5_STABLE [6997da09a] 2020-10-21 16:18:41 -0400 |
| 120 | +--> |
| 121 | + <para> |
| 122 | + When <application>psql</application>'s <command>\connect</command> |
| 123 | + command re-uses connection parameters, ensure that all |
| 124 | + non-overridden parameters from a previous connection string are |
| 125 | + re-used (Tom Lane) |
| 126 | + </para> |
| 127 | + |
| 128 | + <para> |
| 129 | + This avoids cases where reconnection might fail due to omission of |
| 130 | + relevant parameters, such as non-default SSL or GSS options. |
| 131 | + Worse, the reconnection might succeed but not be encrypted as |
| 132 | + intended, or be vulnerable to man-in-the-middle attacks that the |
| 133 | + intended connection parameters would have prevented. |
| 134 | + This is largely the same problem as just cited |
| 135 | + for <application>pg_dump</application> et al, |
| 136 | + although <application>psql</application>'s behavior is more complex |
| 137 | + since the user may intentionally override some connection |
| 138 | + parameters. |
| 139 | + (CVE-2020-25694) |
| 140 | + </para> |
| 141 | + </listitem> |
| 142 | + |
| 143 | + <listitem> |
| 144 | +<!-- |
| 145 | +Author: Noah Misch <noah@leadboat.com> |
| 146 | +Branch: master [098fb0079] 2020-11-09 07:32:09 -0800 |
| 147 | +Branch: REL_13_STABLE [67029845b] 2020-11-09 07:32:12 -0800 |
| 148 | +Branch: REL_12_STABLE [3855e5b47] 2020-11-09 07:32:13 -0800 |
| 149 | +Branch: REL_11_STABLE [7b356c78f] 2020-11-09 07:32:13 -0800 |
| 150 | +Branch: REL_10_STABLE [a498db87b] 2020-11-09 07:32:13 -0800 |
| 151 | +Branch: REL9_6_STABLE [12fd81cb7] 2020-11-09 07:32:14 -0800 |
| 152 | +Branch: REL9_5_STABLE [a54dfbee1] 2020-11-09 07:32:14 -0800 |
| 153 | +--> |
| 154 | + <para> |
| 155 | + Prevent <application>psql</application>'s <command>\gset</command> |
| 156 | + command from modifying specially-treated variables (Noah Misch) |
| 157 | + </para> |
| 158 | + |
| 159 | + <para> |
| 160 | + <command>\gset</command> without a prefix would overwrite whatever |
| 161 | + variables the server told it to. Thus, a compromised server could |
| 162 | + set specially-treated variables such as <varname>PROMPT1</varname>, |
| 163 | + giving the ability to execute arbitrary shell code in the user's |
| 164 | + session. |
| 165 | + </para> |
| 166 | + |
| 167 | + <para> |
| 168 | + The <productname>PostgreSQL</productname> Project thanks |
| 169 | + Nick Cleaton for reporting this problem. |
| 170 | + (CVE-2020-25696) |
| 171 | + </para> |
| 172 | + </listitem> |
| 173 | + |
| 174 | + <listitem> |
| 175 | +<!-- |
33 | 176 | Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
|
34 | 177 | Branch: master [4e9821b6f] 2020-10-14 20:12:26 -0300
|
35 | 178 | Branch: REL_13_STABLE [72e43fc31] 2020-10-14 20:12:26 -0300
|
@@ -722,79 +865,6 @@ Branch: REL9_5_STABLE [aff06436c] 2020-10-28 14:35:53 -0400
|
722 | 865 |
|
723 | 866 | <listitem>
|
724 | 867 | <!--
|
725 |
| -Author: Tom Lane <tgl@sss.pgh.pa.us> |
726 |
| -Branch: master [a45bc8a4f] 2020-09-24 18:19:38 -0400 |
727 |
| -Branch: REL_13_STABLE [cb8885ac4] 2020-09-24 18:19:38 -0400 |
728 |
| -Branch: REL_12_STABLE [fb93f784f] 2020-09-24 18:19:38 -0400 |
729 |
| -Branch: REL_11_STABLE [1738a61c8] 2020-09-24 18:19:39 -0400 |
730 |
| -Branch: REL_10_STABLE [1888ff8d0] 2020-09-24 18:19:39 -0400 |
731 |
| -Branch: REL9_6_STABLE [7c154f2fd] 2020-09-24 18:19:39 -0400 |
732 |
| -Branch: REL9_5_STABLE [56b46d3a1] 2020-09-24 18:19:39 -0400 |
733 |
| -Branch: master [8e5793ab6] 2020-10-19 19:03:46 -0400 |
734 |
| -Branch: REL_13_STABLE [1814f915b] 2020-10-19 19:03:46 -0400 |
735 |
| -Branch: REL_12_STABLE [c6d0b9b16] 2020-10-19 19:03:46 -0400 |
736 |
| -Branch: REL_11_STABLE [5a9f99bed] 2020-10-19 19:03:47 -0400 |
737 |
| -Branch: REL_10_STABLE [68f236993] 2020-10-19 19:03:47 -0400 |
738 |
| -Branch: REL9_6_STABLE [5c78f7977] 2020-10-19 19:03:47 -0400 |
739 |
| -Branch: REL9_5_STABLE [da129a04a] 2020-10-19 19:03:47 -0400 |
740 |
| ---> |
741 |
| - <para> |
742 |
| - Fix usage of complex connection-string parameters |
743 |
| - in <application>pg_dump</application>, |
744 |
| - <application>pg_restore</application>, |
745 |
| - <application>clusterdb</application>, |
746 |
| - <application>reindexdb</application>, |
747 |
| - and <application>vacuumdb</application> (Tom Lane) |
748 |
| - </para> |
749 |
| - |
750 |
| - <para> |
751 |
| - The <option>-d</option> parameter |
752 |
| - of <application>pg_dump</application> |
753 |
| - and <application>pg_restore</application>, or |
754 |
| - the <option>--maintenance-db</option> parameter of the other |
755 |
| - programs mentioned, can be a <quote>connection string</quote> |
756 |
| - containing multiple connection parameters rather than just a |
757 |
| - database name. In cases where these programs need to initiate |
758 |
| - additional connections, such as parallel processing or processing of |
759 |
| - multiple databases, the connection string was forgotten and just the |
760 |
| - basic connection parameters (database name, host, port, and |
761 |
| - username) were used for the additional connections. This could lead |
762 |
| - to connection failures if the connection string included any other |
763 |
| - essential information, such as non-default SSL or GSS parameters. |
764 |
| - </para> |
765 |
| - </listitem> |
766 |
| - |
767 |
| - <listitem> |
768 |
| -<!-- |
769 |
| -Author: Tom Lane <tgl@sss.pgh.pa.us> |
770 |
| -Branch: master [85c54287a] 2020-10-21 16:19:00 -0400 |
771 |
| -Branch: REL_13_STABLE [2e4af4110] 2020-10-21 16:19:00 -0400 |
772 |
| -Branch: REL_12_STABLE [f656517ec] 2020-10-21 16:19:01 -0400 |
773 |
| -Branch: REL_11_STABLE [20be76d5c] 2020-10-21 16:19:01 -0400 |
774 |
| -Branch: REL_10_STABLE [8175da6e7] 2020-10-21 16:19:02 -0400 |
775 |
| -Branch: REL9_6_STABLE [870a23230] 2020-10-21 16:18:41 -0400 |
776 |
| -Branch: REL9_5_STABLE [6997da09a] 2020-10-21 16:18:41 -0400 |
777 |
| ---> |
778 |
| - <para> |
779 |
| - When <application>psql</application>'s <command>\connect</command> |
780 |
| - command re-uses connection parameters, ensure that all |
781 |
| - non-overridden parameters from a previous connection string are |
782 |
| - re-used (Tom Lane) |
783 |
| - </para> |
784 |
| - |
785 |
| - <para> |
786 |
| - This avoids cases where reconnection might fail due to omission of |
787 |
| - relevant parameters, such as non-default SSL or GSS options. This |
788 |
| - is largely the same problem as just cited |
789 |
| - for <application>pg_dump</application> et al, |
790 |
| - although <application>psql</application>'s behavior is more complex |
791 |
| - since the user may intentionally override some connection |
792 |
| - parameters. |
793 |
| - </para> |
794 |
| - </listitem> |
795 |
| - |
796 |
| - <listitem> |
797 |
| -<!-- |
798 | 868 | Author: Andrew Dunstan <andrew@dunslane.net>
|
799 | 869 | Branch: master [3eb3d3e78] 2020-09-04 13:54:54 -0400
|
800 | 870 | Branch: REL_13_STABLE Release: REL_13_0 [72857482c] 2020-09-04 13:55:11 -0400
|
|
0 commit comments