1
0
mirror of https://github.com/postgres/postgres.git synced 2025-05-02 11:44:50 +03:00

Last-minute updates for release notes.

Revise description of CVE-2015-3166, in line with scaled-back patch.
Change release date.

Security: CVE-2015-3166
This commit is contained in:
Tom Lane 2015-05-19 18:33:58 -04:00
parent 221f7a9494
commit baf379bf22
3 changed files with 48 additions and 30 deletions

View File

@ -6,7 +6,7 @@
<note> <note>
<title>Release Date</title> <title>Release Date</title>
<simpara>2015-05-21</simpara> <simpara>2015-05-22</simpara>
</note> </note>
<para> <para>
@ -58,18 +58,24 @@
<listitem> <listitem>
<para> <para>
Consistently check for failure of the <function>*printf()</> family of Improve detection of system-call failures (Noah Misch)
functions (Noah Misch)
</para> </para>
<para> <para>
Most calls of these functions did not consider the possibility that Our replacement implementation of <function>snprintf()</> failed to
the functions could fail with, eg, out-of-memory conditions. The usual check for errors reported by the underlying system library calls;
result would just be missing output, but crashes or exposure of the main case that might be missed is out-of-memory situations.
unintended information are also possible. To protect against such In the worst case this might lead to information exposure, due to our
risks uniformly, create wrappers around these functions that throw an code assuming that a buffer had been overwritten when it hadn't been.
error on failure. Also add missing error checks to a few Also, there were a few places in which security-relevant calls of other
security-relevant calls of other system functions. system library functions did not check for failure.
</para>
<para>
It remains possible that some calls of the <function>*printf()</>
family of functions are vulnerable to information disclosure if an
out-of-memory error occurs at just the wrong time. We judge the risk
to not be large, but will continue analysis in this area.
(CVE-2015-3166) (CVE-2015-3166)
</para> </para>
</listitem> </listitem>

View File

@ -6,7 +6,7 @@
<note> <note>
<title>Release Date</title> <title>Release Date</title>
<simpara>2015-05-21</simpara> <simpara>2015-05-22</simpara>
</note> </note>
<para> <para>
@ -58,18 +58,24 @@
<listitem> <listitem>
<para> <para>
Consistently check for failure of the <function>*printf()</> family of Improve detection of system-call failures (Noah Misch)
functions (Noah Misch)
</para> </para>
<para> <para>
Most calls of these functions did not consider the possibility that Our replacement implementation of <function>snprintf()</> failed to
the functions could fail with, eg, out-of-memory conditions. The usual check for errors reported by the underlying system library calls;
result would just be missing output, but crashes or exposure of the main case that might be missed is out-of-memory situations.
unintended information are also possible. To protect against such In the worst case this might lead to information exposure, due to our
risks uniformly, create wrappers around these functions that throw an code assuming that a buffer had been overwritten when it hadn't been.
error on failure. Also add missing error checks to a few Also, there were a few places in which security-relevant calls of other
security-relevant calls of other system functions. system library functions did not check for failure.
</para>
<para>
It remains possible that some calls of the <function>*printf()</>
family of functions are vulnerable to information disclosure if an
out-of-memory error occurs at just the wrong time. We judge the risk
to not be large, but will continue analysis in this area.
(CVE-2015-3166) (CVE-2015-3166)
</para> </para>
</listitem> </listitem>

View File

@ -6,7 +6,7 @@
<note> <note>
<title>Release Date</title> <title>Release Date</title>
<simpara>2015-05-21</simpara> <simpara>2015-05-22</simpara>
</note> </note>
<para> <para>
@ -58,18 +58,24 @@
<listitem> <listitem>
<para> <para>
Consistently check for failure of the <function>*printf()</> family of Improve detection of system-call failures (Noah Misch)
functions (Noah Misch)
</para> </para>
<para> <para>
Most calls of these functions did not consider the possibility that Our replacement implementation of <function>snprintf()</> failed to
the functions could fail with, eg, out-of-memory conditions. The usual check for errors reported by the underlying system library calls;
result would just be missing output, but crashes or exposure of the main case that might be missed is out-of-memory situations.
unintended information are also possible. To protect against such In the worst case this might lead to information exposure, due to our
risks uniformly, create wrappers around these functions that throw an code assuming that a buffer had been overwritten when it hadn't been.
error on failure. Also add missing error checks to a few Also, there were a few places in which security-relevant calls of other
security-relevant calls of other system functions. system library functions did not check for failure.
</para>
<para>
It remains possible that some calls of the <function>*printf()</>
family of functions are vulnerable to information disclosure if an
out-of-memory error occurs at just the wrong time. We judge the risk
to not be large, but will continue analysis in this area.
(CVE-2015-3166) (CVE-2015-3166)
</para> </para>
</listitem> </listitem>