Skip to content

Commit 3dbb3dd

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2023-5868, CVE-2023-5869, CVE-2023-5870
1 parent c48008f commit 3dbb3dd

File tree

1 file changed

+113
-0
lines changed

1 file changed

+113
-0
lines changed

doc/src/sgml/release-11.sgml

Lines changed: 113 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,119 @@
4141

4242
<listitem>
4343
<!--
44+
Author: Tom Lane <tgl@sss.pgh.pa.us>
45+
Branch: master [3b0776fde] 2023-11-06 10:38:00 -0500
46+
Branch: REL_16_STABLE [d3d1e2509] 2023-11-06 10:38:00 -0500
47+
Branch: REL_15_STABLE [4f4a422fb] 2023-11-06 10:38:00 -0500
48+
Branch: REL_14_STABLE [9146d0d65] 2023-11-06 10:38:00 -0500
49+
Branch: REL_13_STABLE [d3de70fdb] 2023-11-06 10:38:00 -0500
50+
Branch: REL_12_STABLE [e911afd09] 2023-11-06 10:38:00 -0500
51+
Branch: REL_11_STABLE [8c6633f4d] 2023-11-06 10:38:00 -0500
52+
-->
53+
<para>
54+
Fix handling of unknown-type arguments
55+
in <literal>DISTINCT</literal> <type>"any"</type> aggregate
56+
functions (Tom Lane)
57+
</para>
58+
59+
<para>
60+
This error led to a <type>text</type>-type value being interpreted
61+
as an <type>unknown</type>-type value (that is, a zero-terminated
62+
string) at runtime. This could result in disclosure of server
63+
memory following the <type>text</type> value.
64+
</para>
65+
66+
<para>
67+
The <productname>PostgreSQL</productname> Project thanks Jingzhou Fu
68+
for reporting this problem.
69+
(CVE-2023-5868)
70+
</para>
71+
</listitem>
72+
73+
<listitem>
74+
<!--
75+
Author: Tom Lane <tgl@sss.pgh.pa.us>
76+
Branch: master [18b585155] 2023-11-06 10:56:43 -0500
77+
Branch: REL_16_STABLE [e24daa94b] 2023-11-06 10:56:43 -0500
78+
Branch: REL_15_STABLE [3bc6bc3ee] 2023-11-06 10:56:43 -0500
79+
Branch: REL_14_STABLE [edc0a8d82] 2023-11-06 10:56:43 -0500
80+
Branch: REL_13_STABLE [26c599beb] 2023-11-06 10:56:43 -0500
81+
Branch: REL_12_STABLE [d267cea24] 2023-11-06 10:56:43 -0500
82+
Branch: REL_11_STABLE [c48008f59] 2023-11-06 10:56:43 -0500
83+
-->
84+
<para>
85+
Detect integer overflow while computing new array dimensions
86+
(Tom Lane)
87+
</para>
88+
89+
<para>
90+
When assigning new elements to array subscripts that are outside the
91+
current array bounds, an undetected integer overflow could occur in
92+
edge cases. Memory stomps that are potentially exploitable for
93+
arbitrary code execution are possible, and so is disclosure of
94+
server memory.
95+
</para>
96+
97+
<para>
98+
The <productname>PostgreSQL</productname> Project thanks Pedro
99+
Gallegos for reporting this problem.
100+
(CVE-2023-5869)
101+
</para>
102+
</listitem>
103+
104+
<listitem>
105+
<!--
106+
Author: Noah Misch <noah@leadboat.com>
107+
Branch: master [3a9b18b30] 2023-11-06 06:14:13 -0800
108+
Branch: REL_16_STABLE [785412731] 2023-11-06 06:14:16 -0800
109+
Branch: REL_15_STABLE [595c988c9] 2023-11-06 06:14:16 -0800
110+
Branch: REL_14_STABLE [508acb901] 2023-11-06 06:14:17 -0800
111+
Branch: REL_13_STABLE [28b609550] 2023-11-06 06:14:17 -0800
112+
Branch: REL_12_STABLE [2893f2f40] 2023-11-06 06:14:17 -0800
113+
Branch: REL_11_STABLE [e082734c8] 2023-11-06 06:14:18 -0800
114+
Author: Noah Misch <noah@leadboat.com>
115+
Branch: master [b72de09a1] 2023-11-06 06:14:13 -0800
116+
Branch: REL_16_STABLE [2c3c5ec49] 2023-11-06 06:14:16 -0800
117+
Branch: REL_15_STABLE [fbc371909] 2023-11-06 06:14:16 -0800
118+
Branch: REL_14_STABLE [ecd5d240c] 2023-11-06 06:14:17 -0800
119+
Branch: REL_13_STABLE [2c7a2a00a] 2023-11-06 06:14:17 -0800
120+
Branch: REL_12_STABLE [7bbf4d037] 2023-11-06 06:14:17 -0800
121+
Branch: REL_11_STABLE [a27be40c1] 2023-11-06 06:14:18 -0800
122+
-->
123+
<para>
124+
Prevent the <literal>pg_signal_backend</literal> role from
125+
signalling background workers and autovacuum processes
126+
(Noah Misch, Jelte Fennema-Nio)
127+
</para>
128+
129+
<para>
130+
The documentation says that <literal>pg_signal_backend</literal>
131+
cannot issue signals to superuser-owned processes. It was able to
132+
signal these background processes, though, because they advertise a
133+
role OID of zero. Treat that as indicating superuser ownership.
134+
The security implications of cancelling one of these process types
135+
are fairly small so far as the core code goes (we'll just start
136+
another one), but extensions might add background workers that are
137+
more vulnerable.
138+
</para>
139+
140+
<para>
141+
Also ensure that the <varname>is_superuser</varname> parameter is
142+
set correctly in such processes. No specific security consequences
143+
are known for that oversight, but it might be significant for some
144+
extensions.
145+
</para>
146+
147+
<para>
148+
The <productname>PostgreSQL</productname> Project thanks
149+
Hemanth Sandrana and Mahendrakar Srinivasarao
150+
for reporting this problem.
151+
(CVE-2023-5870)
152+
</para>
153+
</listitem>
154+
155+
<listitem>
156+
<!--
44157
Author: David Rowley <drowley@postgresql.org>
45158
Branch: master [d9e46dfb7] 2023-10-13 01:12:31 +1300
46159
Branch: REL_16_STABLE [595db9e9c] 2023-10-13 01:13:07 +1300

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy