Last-minute updates for release notes.

Security: CVE-2024-7348
This commit is contained in:
Tom Lane 2024-08-05 14:03:20 -04:00
parent e81e53a0c1
commit 6eca8a5673
1 changed files with 39 additions and 0 deletions

View File

@ -35,6 +35,45 @@
<listitem>
<!--
Author: Masahiko Sawada <msawada@postgresql.org>
Branch: master [66e94448a] 2024-08-05 06:05:33 -0700
Branch: REL_17_STABLE [fdf218f1d] 2024-08-05 06:05:30 -0700
Branch: REL_16_STABLE [6aba85a4b] 2024-08-05 06:05:28 -0700
Branch: REL_15_STABLE [e81e53a0c] 2024-08-05 06:05:25 -0700
Branch: REL_14_STABLE [72ef1675e] 2024-08-05 06:05:23 -0700
Branch: REL_13_STABLE [bbc94abf6] 2024-08-05 06:05:20 -0700
Branch: REL_12_STABLE [79c7a7e29] 2024-08-05 06:05:17 -0700
-->
<para>
Prevent unauthorized code execution
during <application>pg_dump</application> (Masahiko Sawada)
</para>
<para>
An attacker able to create and drop non-temporary objects could
inject SQL code that would be executed by a
concurrent <application>pg_dump</application> session with the
privileges of the role running <application>pg_dump</application>
(which is often a superuser). The attack involves replacing a
sequence or similar object with a view or foreign table that will
execute malicious code. To prevent this, introduce a new server
parameter <varname>restrict_nonsystem_relation_kind</varname> that
can disable expansion of non-builtin views as well as access to
foreign tables, and teach <application>pg_dump</application> to set
it when available. Note that the attack is prevented only if
both <application>pg_dump</application> and the server it is dumping
from are new enough to have this fix.
</para>
<para>
The <productname>PostgreSQL</productname> Project thanks
Noah Misch for reporting this problem.
(CVE-2024-7348)
</para>
</listitem>
<listitem>
<!--
Author: Melanie Plageman <melanieplageman@gmail.com>
Branch: master [83c39a1f7] 2024-07-19 12:04:00 -0400
Branch: REL_17_STABLE [fd4f12df5] 2024-07-19 12:12:03 -0400