mirror of
				https://github.com/postgres/postgres.git
				synced 2025-11-03 09:13:20 +03:00 
			
		
		
		
	Last-minute updates for release notes.
Security: CVE-2024-7348
This commit is contained in:
		@@ -35,6 +35,45 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    <listitem>
 | 
					    <listitem>
 | 
				
			||||||
<!--
 | 
					<!--
 | 
				
			||||||
 | 
					Author: Masahiko Sawada <msawada@postgresql.org>
 | 
				
			||||||
 | 
					Branch: master [66e94448a] 2024-08-05 06:05:33 -0700
 | 
				
			||||||
 | 
					Branch: REL_17_STABLE [fdf218f1d] 2024-08-05 06:05:30 -0700
 | 
				
			||||||
 | 
					Branch: REL_16_STABLE [6aba85a4b] 2024-08-05 06:05:28 -0700
 | 
				
			||||||
 | 
					Branch: REL_15_STABLE [e81e53a0c] 2024-08-05 06:05:25 -0700
 | 
				
			||||||
 | 
					Branch: REL_14_STABLE [72ef1675e] 2024-08-05 06:05:23 -0700
 | 
				
			||||||
 | 
					Branch: REL_13_STABLE [bbc94abf6] 2024-08-05 06:05:20 -0700
 | 
				
			||||||
 | 
					Branch: REL_12_STABLE [79c7a7e29] 2024-08-05 06:05:17 -0700
 | 
				
			||||||
 | 
					-->
 | 
				
			||||||
 | 
					     <para>
 | 
				
			||||||
 | 
					      Prevent unauthorized code execution
 | 
				
			||||||
 | 
					      during <application>pg_dump</application> (Masahiko Sawada)
 | 
				
			||||||
 | 
					     </para>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					     <para>
 | 
				
			||||||
 | 
					      An attacker able to create and drop non-temporary objects could
 | 
				
			||||||
 | 
					      inject SQL code that would be executed by a
 | 
				
			||||||
 | 
					      concurrent <application>pg_dump</application> session with the
 | 
				
			||||||
 | 
					      privileges of the role running <application>pg_dump</application>
 | 
				
			||||||
 | 
					      (which is often a superuser).  The attack involves replacing a
 | 
				
			||||||
 | 
					      sequence or similar object with a view or foreign table that will
 | 
				
			||||||
 | 
					      execute malicious code.  To prevent this, introduce a new server
 | 
				
			||||||
 | 
					      parameter <varname>restrict_nonsystem_relation_kind</varname> that
 | 
				
			||||||
 | 
					      can disable expansion of non-builtin views as well as access to
 | 
				
			||||||
 | 
					      foreign tables, and teach <application>pg_dump</application> to set
 | 
				
			||||||
 | 
					      it when available.  Note that the attack is prevented only if
 | 
				
			||||||
 | 
					      both <application>pg_dump</application> and the server it is dumping
 | 
				
			||||||
 | 
					      from are new enough to have this fix.
 | 
				
			||||||
 | 
					     </para>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					     <para>
 | 
				
			||||||
 | 
					      The <productname>PostgreSQL</productname> Project thanks
 | 
				
			||||||
 | 
					      Noah Misch for reporting this problem.
 | 
				
			||||||
 | 
					      (CVE-2024-7348)
 | 
				
			||||||
 | 
					     </para>
 | 
				
			||||||
 | 
					    </listitem>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    <listitem>
 | 
				
			||||||
 | 
					<!--
 | 
				
			||||||
Author: Richard Guo <rguo@postgresql.org>
 | 
					Author: Richard Guo <rguo@postgresql.org>
 | 
				
			||||||
Branch: master [0ffc0acaf] 2024-07-08 10:11:46 +0900
 | 
					Branch: master [0ffc0acaf] 2024-07-08 10:11:46 +0900
 | 
				
			||||||
Branch: REL_17_STABLE [cccab85c2] 2024-07-08 10:17:12 +0900
 | 
					Branch: REL_17_STABLE [cccab85c2] 2024-07-08 10:17:12 +0900
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user