mirror of
https://github.com/postgres/postgres.git
synced 2025-04-27 22:56:53 +03:00
Last-minute updates for release notes.
Security: CVE-2018-1052, CVE-2018-1053
This commit is contained in:
parent
c452abbd06
commit
2a08ab38d3
@ -33,6 +33,28 @@
|
||||
|
||||
<itemizedlist>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Ensure that all temporary files made
|
||||
by <application>pg_upgrade</application> are non-world-readable
|
||||
(Tom Lane, Noah Misch)
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<application>pg_upgrade</application> normally restricts its
|
||||
temporary files to be readable and writable only by the calling user.
|
||||
But the temporary file containing <literal>pg_dumpall -g</literal>
|
||||
output would be group- or world-readable, or even writable, if the
|
||||
user's <literal>umask</literal> setting allows. In typical usage on
|
||||
multi-user machines, the <literal>umask</literal> and/or the working
|
||||
directory's permissions would be tight enough to prevent problems;
|
||||
but there may be people using <application>pg_upgrade</application>
|
||||
in scenarios where this oversight would permit disclosure of database
|
||||
passwords to unfriendly eyes.
|
||||
(CVE-2018-1053)
|
||||
</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Fix vacuuming of tuples that were updated while key-share locked
|
||||
|
@ -33,6 +33,28 @@
|
||||
|
||||
<itemizedlist>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Ensure that all temporary files made
|
||||
by <application>pg_upgrade</application> are non-world-readable
|
||||
(Tom Lane, Noah Misch)
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<application>pg_upgrade</application> normally restricts its
|
||||
temporary files to be readable and writable only by the calling user.
|
||||
But the temporary file containing <literal>pg_dumpall -g</literal>
|
||||
output would be group- or world-readable, or even writable, if the
|
||||
user's <literal>umask</literal> setting allows. In typical usage on
|
||||
multi-user machines, the <literal>umask</literal> and/or the working
|
||||
directory's permissions would be tight enough to prevent problems;
|
||||
but there may be people using <application>pg_upgrade</application>
|
||||
in scenarios where this oversight would permit disclosure of database
|
||||
passwords to unfriendly eyes.
|
||||
(CVE-2018-1053)
|
||||
</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Fix vacuuming of tuples that were updated while key-share locked
|
||||
|
@ -33,6 +33,28 @@
|
||||
|
||||
<itemizedlist>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Ensure that all temporary files made
|
||||
by <application>pg_upgrade</application> are non-world-readable
|
||||
(Tom Lane, Noah Misch)
|
||||
</para>
|
||||
|
||||
<para>
|
||||
<application>pg_upgrade</application> normally restricts its
|
||||
temporary files to be readable and writable only by the calling user.
|
||||
But the temporary file containing <literal>pg_dumpall -g</literal>
|
||||
output would be group- or world-readable, or even writable, if the
|
||||
user's <literal>umask</literal> setting allows. In typical usage on
|
||||
multi-user machines, the <literal>umask</literal> and/or the working
|
||||
directory's permissions would be tight enough to prevent problems;
|
||||
but there may be people using <application>pg_upgrade</application>
|
||||
in scenarios where this oversight would permit disclosure of database
|
||||
passwords to unfriendly eyes.
|
||||
(CVE-2018-1053)
|
||||
</para>
|
||||
</listitem>
|
||||
|
||||
<listitem>
|
||||
<para>
|
||||
Fix vacuuming of tuples that were updated while key-share locked
|
||||
|
Loading…
x
Reference in New Issue
Block a user