diff options
author | Tom Lane | 2012-02-23 22:47:52 +0000 |
---|---|---|
committer | Tom Lane | 2012-02-23 22:47:52 +0000 |
commit | b2ce60703ab431a1d6c10f50587ea5f5e984af2e (patch) | |
tree | 9e4078702f929c0abadb6dbeee952f5ec4b4610d /doc/src/sgml/release-9.0.sgml | |
parent | 89e0bac86dbca40dfc321926205f2a90d3da5437 (diff) |
Last-minute release note updates.
Security: CVE-2012-0866, CVE-2012-0867, CVE-2012-0868
Diffstat (limited to 'doc/src/sgml/release-9.0.sgml')
-rw-r--r-- | doc/src/sgml/release-9.0.sgml | 50 |
1 files changed, 50 insertions, 0 deletions
diff --git a/doc/src/sgml/release-9.0.sgml b/doc/src/sgml/release-9.0.sgml index 7b29590bb11..16de221dc11 100644 --- a/doc/src/sgml/release-9.0.sgml +++ b/doc/src/sgml/release-9.0.sgml @@ -36,6 +36,56 @@ <listitem> <para> + Require execute permission on the trigger function for + <command>CREATE TRIGGER</> (Robert Haas) + </para> + + <para> + This missing check could allow another user to execute a trigger + function with forged input data, by installing it on a table he owns. + This is only of significance for trigger functions marked + <literal>SECURITY DEFINER</>, since otherwise trigger functions run + as the table owner anyway. (CVE-2012-0866) + </para> + </listitem> + + <listitem> + <para> + Remove arbitrary limitation on length of common name in SSL + certificates (Heikki Linnakangas) + </para> + + <para> + Both <application>libpq</> and the server truncated the common name + extracted from an SSL certificate at 32 bytes. Normally this would + cause nothing worse than an unexpected verification failure, but there + are some rather-implausible scenarios in which it might allow one + certificate holder to impersonate another. The victim would have to + have a common name exactly 32 bytes long, and the attacker would have + to persuade a trusted CA to issue a certificate in which the common + name has that string as a prefix. Impersonating a server would also + require some additional exploit to redirect client connections. + (CVE-2012-0867) + </para> + </listitem> + + <listitem> + <para> + Convert newlines to spaces in names written in <application>pg_dump</> + comments (Robert Haas) + </para> + + <para> + <application>pg_dump</> was incautious about sanitizing object names + that are emitted within SQL comments in its output script. A name + containing a newline would at least render the script syntactically + incorrect. Maliciously crafted object names could present a SQL + injection risk when the script is reloaded. (CVE-2012-0868) + </para> + </listitem> + + <listitem> + <para> Fix btree index corruption from insertions concurrent with vacuuming (Tom Lane) </para> |