Skip to content

Commit 2e19ad7

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2025-8713, CVE-2025-8714, CVE-2025-8715
1 parent 8967c33 commit 2e19ad7

File tree

1 file changed

+128
-1
lines changed

1 file changed

+128
-1
lines changed

doc/src/sgml/release-14.sgml

Lines changed: 128 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
<para>
2626
However, if you have any
2727
BRIN <literal>numeric_minmax_multi_ops</literal> indexes, it is
28-
advisable to reindex them after updating. See the first changelog
28+
advisable to reindex them after updating. See the fourth changelog
2929
entry below.
3030
</para>
3131

@@ -42,6 +42,133 @@
4242

4343
<listitem>
4444
<!--
45+
Author: Dean Rasheed <dean.a.rasheed@gmail.com>
46+
Branch: master [22424953c] 2025-08-11 09:03:11 +0100
47+
Branch: REL_18_STABLE [64f77c6a6] 2025-08-11 09:07:36 +0100
48+
Branch: REL_17_STABLE [a85eddab2] 2025-08-11 09:09:12 +0100
49+
Branch: REL_16_STABLE [7e86da539] 2025-08-11 09:10:17 +0100
50+
Branch: REL_15_STABLE [415badc13] 2025-08-11 09:11:02 +0100
51+
Branch: REL_14_STABLE [afe38fb6a] 2025-08-11 09:12:09 +0100
52+
Branch: REL_13_STABLE [533211ded] 2025-08-11 09:13:20 +0100
53+
-->
54+
<para>
55+
Tighten security checks in planner estimation functions
56+
(Dean Rasheed)
57+
<ulink url="&commit_baseurl;afe38fb6a">&sect;</ulink>
58+
</para>
59+
60+
<para>
61+
The fix for CVE-2017-7484, plus followup fixes, intended to prevent
62+
leaky functions from being applied to statistics data for columns
63+
that the calling user does not have permission to read. Two gaps in
64+
that protection have been found. One gap applies to partitioning
65+
and inheritance hierarchies where RLS policies on the tables should
66+
restrict access to statistics data, but did not.
67+
</para>
68+
69+
<para>
70+
The other gap applies to cases where the query accesses a table via
71+
a view, and the view owner has permissions to read the underlying
72+
table but the calling user does not have permissions on the view.
73+
The view owner's permissions satisfied the security checks, and the
74+
leaky function would get applied to the underlying table's
75+
statistics before we check the calling user's permissions on the
76+
view. This has been fixed by making security checks on views occur
77+
at the start of planning. That might cause permissions failures to
78+
occur earlier than before.
79+
</para>
80+
81+
<para>
82+
The <productname>PostgreSQL</productname> Project thanks
83+
Dean Rasheed for reporting this problem.
84+
(CVE-2025-8713)
85+
</para>
86+
</listitem>
87+
88+
<listitem>
89+
<!--
90+
Author: Nathan Bossart <nathan@postgresql.org>
91+
Branch: master [71ea0d679] 2025-08-11 09:00:00 -0500
92+
Branch: REL_18_STABLE [67a2fbb8f] 2025-08-11 09:00:00 -0500
93+
Branch: REL_17_STABLE [575f54d4c] 2025-08-11 09:00:00 -0500
94+
Branch: REL_16_STABLE [7ad8e7909] 2025-08-11 09:00:00 -0500
95+
Branch: REL_15_STABLE [424040506] 2025-08-11 09:00:00 -0500
96+
Branch: REL_14_STABLE [e4998d089] 2025-08-11 09:00:00 -0500
97+
Branch: REL_13_STABLE [c204bd39f] 2025-08-11 09:00:00 -0500
98+
Branch: REL_14_STABLE [8967c33c6] 2025-08-11 12:37:00 -0500
99+
Branch: REL_13_STABLE [27d3dee68] 2025-08-11 12:37:00 -0500
100+
-->
101+
<para>
102+
Prevent <application>pg_dump</application> scripts from being used
103+
to attack the user running the restore (Nathan Bossart)
104+
<ulink url="&commit_baseurl;e4998d089">&sect;</ulink>
105+
<ulink url="&commit_baseurl;8967c33c6">&sect;</ulink>
106+
</para>
107+
108+
<para>
109+
Since dump/restore operations typically involve running SQL commands
110+
as superuser, the target database installation must trust the source
111+
server. However, it does not follow that the operating system user
112+
who executes <application>psql</application> to perform the restore
113+
should have to trust the source server. The risk here is that an
114+
attacker who has gained superuser-level control over the source
115+
server might be able to cause it to emit text that would be
116+
interpreted as <application>psql</application> meta-commands.
117+
That would provide shell-level access to the restoring user's own
118+
account, independently of access to the target database.
119+
</para>
120+
121+
<para>
122+
To provide a positive guarantee that this can't happen,
123+
extend <application>psql</application> with
124+
a <command>\restrict</command> command that prevents execution of
125+
further meta-commands, and teach <application>pg_dump</application>
126+
to issue that before any data coming from the source server.
127+
</para>
128+
129+
<para>
130+
The PostgreSQL Project thanks Martin Rakhmanov, Matthieu Denais, and
131+
RyotaK for reporting this problem.
132+
(CVE-2025-8714)
133+
</para>
134+
</listitem>
135+
136+
<listitem>
137+
<!--
138+
Author: Noah Misch <noah@leadboat.com>
139+
Branch: master [70693c645] 2025-08-11 06:18:59 -0700
140+
Branch: REL_18_STABLE [13a67ce60] 2025-08-11 06:19:03 -0700
141+
Branch: REL_17_STABLE [9b92f115b] 2025-08-11 06:19:03 -0700
142+
Branch: REL_16_STABLE [850caae60] 2025-08-11 06:19:03 -0700
143+
Branch: REL_15_STABLE [9751f934a] 2025-08-11 06:19:04 -0700
144+
Branch: REL_14_STABLE [0f5838438] 2025-08-11 06:19:04 -0700
145+
Branch: REL_13_STABLE [2179e6005] 2025-08-11 06:19:05 -0700
146+
-->
147+
<para>
148+
Convert newlines to spaces in names included in comments
149+
in <application>pg_dump</application> output
150+
(Noah Misch)
151+
<ulink url="&commit_baseurl;0f5838438">&sect;</ulink>
152+
</para>
153+
154+
<para>
155+
Object names containing newlines offered the ability to inject
156+
arbitrary SQL commands into the output script. (Without the
157+
preceding fix, injection of <application>psql</application>
158+
meta-commands would also be possible this way.)
159+
CVE-2012-0868 fixed this class of problem at the time, but later
160+
work reintroduced several cases.
161+
</para>
162+
163+
<para>
164+
The <productname>PostgreSQL</productname> Project thanks
165+
Noah Misch for reporting this problem.
166+
(CVE-2025-8715)
167+
</para>
168+
</listitem>
169+
170+
<listitem>
171+
<!--
45172
Author: Tom Lane <tgl@sss.pgh.pa.us>
46173
Branch: master [80c758a2e] 2025-08-05 16:51:10 -0400
47174
Branch: REL_18_STABLE [9b681e239] 2025-08-05 16:51:10 -0400

0 commit comments

Comments
 (0)