Skip to content

Commit 402c3ba

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2021-23214, CVE-2021-23222
1 parent 844b316 commit 402c3ba

File tree

1 file changed

+69
-1
lines changed

1 file changed

+69
-1
lines changed

doc/src/sgml/release-13.sgml

Lines changed: 69 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, note that installations using physical replication should
2727
update standby servers before the primary server, as explained in
28-
the first changelog entry below.
28+
the third changelog entry below.
2929
</para>
3030

3131
<para>
@@ -48,6 +48,74 @@
4848

4949
<listitem>
5050
<!--
51+
Author: Tom Lane <tgl@sss.pgh.pa.us>
52+
Branch: master [28e241255] 2021-11-08 11:01:43 -0500
53+
Branch: REL_14_STABLE [9d5a76b8d] 2021-11-08 11:01:43 -0500
54+
Branch: REL_13_STABLE [e92ed93e8] 2021-11-08 11:01:43 -0500
55+
Branch: REL_12_STABLE [d1bd26740] 2021-11-08 11:01:43 -0500
56+
Branch: REL_11_STABLE [9394fb828] 2021-11-08 11:01:43 -0500
57+
Branch: REL_10_STABLE [9ae0f1112] 2021-11-08 11:01:43 -0500
58+
Branch: REL9_6_STABLE [046c2c846] 2021-11-08 11:01:43 -0500
59+
-->
60+
<para>
61+
Make the server reject extraneous data after an SSL or GSS
62+
encryption handshake (Tom Lane)
63+
</para>
64+
65+
<para>
66+
A man-in-the-middle with the ability to inject data into the TCP
67+
connection could stuff some cleartext data into the start of a
68+
supposedly encryption-protected database session.
69+
This could be abused to send faked SQL commands to the server,
70+
although that would only work if the server did not demand any
71+
authentication data. (However, a server relying on SSL certificate
72+
authentication might well not do so.)
73+
</para>
74+
75+
<para>
76+
The <productname>PostgreSQL</productname> Project thanks
77+
Jacob Champion for reporting this problem.
78+
(CVE-2021-23214)
79+
</para>
80+
</listitem>
81+
82+
<listitem>
83+
<!--
84+
Author: Tom Lane <tgl@sss.pgh.pa.us>
85+
Branch: master [160c02588] 2021-11-08 11:14:56 -0500
86+
Branch: REL_14_STABLE [30547d791] 2021-11-08 11:14:56 -0500
87+
Branch: REL_13_STABLE [844b31692] 2021-11-08 11:14:56 -0500
88+
Branch: REL_12_STABLE [36bb95ef2] 2021-11-08 11:14:56 -0500
89+
Branch: REL_11_STABLE [a021a1d2a] 2021-11-08 11:14:56 -0500
90+
Branch: REL_10_STABLE [e65d9c8cd] 2021-11-08 11:14:56 -0500
91+
Branch: REL9_6_STABLE [d83cdfdca] 2021-11-08 11:14:57 -0500
92+
-->
93+
<para>
94+
Make <application>libpq</application> reject extraneous data after
95+
an SSL or GSS encryption handshake (Tom Lane)
96+
</para>
97+
98+
<para>
99+
A man-in-the-middle with the ability to inject data into the TCP
100+
connection could stuff some cleartext data into the start of a
101+
supposedly encryption-protected database session.
102+
This could probably be abused to inject faked responses to the
103+
client's first few queries, although other details of libpq's
104+
behavior make that harder than it sounds. A different line of
105+
attack is to exfiltrate the client's password, or other sensitive
106+
data that might be sent early in the session. That has been shown
107+
to be possible with a server vulnerable to CVE-2021-23214.
108+
</para>
109+
110+
<para>
111+
The <productname>PostgreSQL</productname> Project thanks
112+
Jacob Champion for reporting this problem.
113+
(CVE-2021-23222)
114+
</para>
115+
</listitem>
116+
117+
<listitem>
118+
<!--
51119
Author: Alvaro Herrera <alvherre@alvh.no-ip.org>
52120
Branch: master [ff9f111bc] 2021-09-29 11:21:51 -0300
53121
Branch: REL_14_STABLE [64a8687a6] 2021-09-29 11:41:01 -0300

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy