summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTom Lane2024-02-05 16:51:11 +0000
committerTom Lane2024-02-05 16:51:11 +0000
commitcb620968b6f7339113b7873b9abf5885cb4aa1ee (patch)
tree5f3e0f6cbd48034eab8163645e3b755ab3539597
parent5b5483f1fd85dd0c6af7908ac442c6f0f2f60382 (diff)
Last-minute updates for release notes.
Security: CVE-2024-0985 (not CVE-2023-5869 as claimed in prior commit msg)
-rw-r--r--doc/src/sgml/release-15.sgml44
1 files changed, 44 insertions, 0 deletions
diff --git a/doc/src/sgml/release-15.sgml b/doc/src/sgml/release-15.sgml
index 1f3f3aebac6..c2b812271c7 100644
--- a/doc/src/sgml/release-15.sgml
+++ b/doc/src/sgml/release-15.sgml
@@ -41,6 +41,50 @@
<listitem>
<!--
+Author: Heikki Linnakangas <[email protected]>
+Branch: master [5a9167c39] 2024-02-05 11:01:23 +0200
+Branch: REL_16_STABLE [d6a61cb3b] 2024-02-05 11:02:56 +0200
+Branch: REL_15_STABLE [f2fdea198] 2024-02-05 11:03:26 +0200
+Branch: REL_14_STABLE [f4f288352] 2024-02-05 11:03:43 +0200
+Branch: REL_13_STABLE [d541ce3b6] 2024-02-05 11:04:08 +0200
+Branch: REL_12_STABLE [2699fc035] 2024-02-05 11:04:22 +0200
+Branch: master [b96115acb] 2024-02-05 11:01:30 +0200
+Branch: REL_16_STABLE [fb3836855] 2024-02-05 11:03:03 +0200
+Branch: REL_15_STABLE [06f36bc01] 2024-02-05 11:03:28 +0200
+Branch: REL_14_STABLE [a45c950ae] 2024-02-05 11:03:43 +0200
+Branch: REL_13_STABLE [b73d21648] 2024-02-05 11:04:10 +0200
+Branch: REL_12_STABLE [add8bc9b8] 2024-02-05 11:04:23 +0200
+-->
+ <para>
+ Tighten security restrictions within <command>REFRESH MATERIALIZED
+ VIEW CONCURRENTLY</command> (Heikki Linnakangas)
+ </para>
+
+ <para>
+ One step of a concurrent refresh command was run under weak security
+ restrictions. If a materialized view's owner could persuade a
+ superuser or other high-privileged user to perform a concurrent
+ refresh on that view, the view's owner could control code executed
+ with the privileges of the user running <command>REFRESH</command>.
+ Fix things so that all user-determined code is run as the view's
+ owner, as expected.
+ </para>
+
+ <para>
+ The only known exploit for this error does not work
+ in <productname>PostgreSQL</productname> 16.0 and later, so it may
+ be that v16 is not vulnerable in practice.
+ </para>
+
+ <para>
+ The <productname>PostgreSQL</productname> Project thanks Pedro
+ Gallegos for reporting this problem.
+ (CVE-2024-0985) <!-- not CVE-2023-5869 as claimed in commit msg -->
+ </para>
+ </listitem>
+
+ <listitem>
+<!--
Author: Daniel Gustafsson <[email protected]>
Branch: master [9dce22033] 2023-09-27 13:02:21 +0200
Branch: REL_16_STABLE [2cf50585e] 2023-11-17 10:18:38 +0100