Skip to content

Commit 86ad5a8

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2025-8713, CVE-2025-8714, CVE-2025-8715
1 parent 575f54d commit 86ad5a8

File tree

1 file changed

+127
-1
lines changed

1 file changed

+127
-1
lines changed

doc/src/sgml/release-17.sgml

Lines changed: 127 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, if you have any
2727
BRIN <literal>numeric_minmax_multi_ops</literal> indexes, it is
28-
advisable to reindex them after updating. See the first changelog
28+
advisable to reindex them after updating. See the fourth changelog
2929
entry below.
3030
</para>
3131

@@ -42,6 +42,132 @@
4242

4343
<listitem>
4444
<!--
45+
Author: Dean Rasheed <dean.a.rasheed@gmail.com>
46+
Branch: master [22424953c] 2025-08-11 09:03:11 +0100
47+
Branch: REL_18_STABLE [64f77c6a6] 2025-08-11 09:07:36 +0100
48+
Branch: REL_17_STABLE [a85eddab2] 2025-08-11 09:09:12 +0100
49+
Branch: REL_16_STABLE [7e86da539] 2025-08-11 09:10:17 +0100
50+
Branch: REL_15_STABLE [415badc13] 2025-08-11 09:11:02 +0100
51+
Branch: REL_14_STABLE [afe38fb6a] 2025-08-11 09:12:09 +0100
52+
Branch: REL_13_STABLE [533211ded] 2025-08-11 09:13:20 +0100
53+
-->
54+
<para>
55+
Tighten security checks in planner estimation functions
56+
(Dean Rasheed)
57+
<ulink url="&commit_baseurl;a85eddab2">&sect;</ulink>
58+
</para>
59+
60+
<para>
61+
The fix for CVE-2017-7484, plus followup fixes, intended to prevent
62+
leaky functions from being applied to statistics data for columns
63+
that the calling user does not have permission to read. Two gaps in
64+
that protection have been found. One gap applies to partitioning
65+
and inheritance hierarchies where RLS policies on the tables should
66+
restrict access to statistics data, but did not.
67+
</para>
68+
69+
<para>
70+
The other gap applies to cases where the query accesses a table via
71+
a view, and the view owner has permissions to read the underlying
72+
table but the calling user does not have permissions on the view.
73+
The view owner's permissions satisfied the security checks, and the
74+
leaky function would get applied to the underlying table's
75+
statistics before we check the calling user's permissions on the
76+
view. This has been fixed by making security checks on views occur
77+
at the start of planning. That might cause permissions failures to
78+
occur earlier than before.
79+
</para>
80+
81+
<para>
82+
The <productname>PostgreSQL</productname> Project thanks
83+
Dean Rasheed for reporting this problem.
84+
(CVE-2025-8713)
85+
</para>
86+
</listitem>
87+
88+
<listitem>
89+
<!--
90+
Author: Nathan Bossart <nathan@postgresql.org>
91+
Branch: master [71ea0d679] 2025-08-11 09:00:00 -0500
92+
Branch: REL_18_STABLE [67a2fbb8f] 2025-08-11 09:00:00 -0500
93+
Branch: REL_17_STABLE [575f54d4c] 2025-08-11 09:00:00 -0500
94+
Branch: REL_16_STABLE [7ad8e7909] 2025-08-11 09:00:00 -0500
95+
Branch: REL_15_STABLE [424040506] 2025-08-11 09:00:00 -0500
96+
Branch: REL_14_STABLE [e4998d089] 2025-08-11 09:00:00 -0500
97+
Branch: REL_13_STABLE [c204bd39f] 2025-08-11 09:00:00 -0500
98+
Branch: REL_14_STABLE [8967c33c6] 2025-08-11 12:37:00 -0500
99+
Branch: REL_13_STABLE [27d3dee68] 2025-08-11 12:37:00 -0500
100+
-->
101+
<para>
102+
Prevent <application>pg_dump</application> scripts from being used
103+
to attack the user running the restore (Nathan Bossart)
104+
<ulink url="&commit_baseurl;575f54d4c">&sect;</ulink>
105+
</para>
106+
107+
<para>
108+
Since dump/restore operations typically involve running SQL commands
109+
as superuser, the target database installation must trust the source
110+
server. However, it does not follow that the operating system user
111+
who executes <application>psql</application> to perform the restore
112+
should have to trust the source server. The risk here is that an
113+
attacker who has gained superuser-level control over the source
114+
server might be able to cause it to emit text that would be
115+
interpreted as <application>psql</application> meta-commands.
116+
That would provide shell-level access to the restoring user's own
117+
account, independently of access to the target database.
118+
</para>
119+
120+
<para>
121+
To provide a positive guarantee that this can't happen,
122+
extend <application>psql</application> with
123+
a <command>\restrict</command> command that prevents execution of
124+
further meta-commands, and teach <application>pg_dump</application>
125+
to issue that before any data coming from the source server.
126+
</para>
127+
128+
<para>
129+
The PostgreSQL Project thanks Martin Rakhmanov, Matthieu Denais, and
130+
RyotaK for reporting this problem.
131+
(CVE-2025-8714)
132+
</para>
133+
</listitem>
134+
135+
<listitem>
136+
<!--
137+
Author: Noah Misch <noah@leadboat.com>
138+
Branch: master [70693c645] 2025-08-11 06:18:59 -0700
139+
Branch: REL_18_STABLE [13a67ce60] 2025-08-11 06:19:03 -0700
140+
Branch: REL_17_STABLE [9b92f115b] 2025-08-11 06:19:03 -0700
141+
Branch: REL_16_STABLE [850caae60] 2025-08-11 06:19:03 -0700
142+
Branch: REL_15_STABLE [9751f934a] 2025-08-11 06:19:04 -0700
143+
Branch: REL_14_STABLE [0f5838438] 2025-08-11 06:19:04 -0700
144+
Branch: REL_13_STABLE [2179e6005] 2025-08-11 06:19:05 -0700
145+
-->
146+
<para>
147+
Convert newlines to spaces in names included in comments
148+
in <application>pg_dump</application> output
149+
(Noah Misch)
150+
<ulink url="&commit_baseurl;9b92f115b">&sect;</ulink>
151+
</para>
152+
153+
<para>
154+
Object names containing newlines offered the ability to inject
155+
arbitrary SQL commands into the output script. (Without the
156+
preceding fix, injection of <application>psql</application>
157+
meta-commands would also be possible this way.)
158+
CVE-2012-0868 fixed this class of problem at the time, but later
159+
work reintroduced several cases.
160+
</para>
161+
162+
<para>
163+
The <productname>PostgreSQL</productname> Project thanks
164+
Noah Misch for reporting this problem.
165+
(CVE-2025-8715)
166+
</para>
167+
</listitem>
168+
169+
<listitem>
170+
<!--
45171
Author: Tom Lane <tgl@sss.pgh.pa.us>
46172
Branch: master [80c758a2e] 2025-08-05 16:51:10 -0400
47173
Branch: REL_18_STABLE [9b681e239] 2025-08-05 16:51:10 -0400

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy