Last-minute updates for release notes.
authorTom Lane
Mon, 5 Feb 2018 19:43:40 +0000 (14:43 -0500)
committerTom Lane
Mon, 5 Feb 2018 19:44:04 +0000 (14:44 -0500)
Security: CVE-2018-1052, CVE-2018-1053

doc/src/sgml/release-10.sgml
doc/src/sgml/release-9.3.sgml
doc/src/sgml/release-9.4.sgml
doc/src/sgml/release-9.5.sgml
doc/src/sgml/release-9.6.sgml

index 6d589e5d560c96a81d429e2a9c274edc77058087..dbb1a9b2e6d6adc6af59da5c24bf037fd2435aa7 100644 (file)
 
     
 
+     
+      Fix processing of partition keys containing multiple expressions
+      (Álvaro Herrera, David Rowley)
+     
+
+     
+      This error led to crashes or, with carefully crafted input, disclosure
+      of arbitrary backend memory.
+      (CVE-2018-1052)
+     
+    
+
+    
+
+     
+      Ensure that all temporary files made
+      by pg_upgrade are non-world-readable
+      (Tom Lane, Noah Misch)
+     
+
+     
+      pg_upgrade normally restricts its
+      temporary files to be readable and writable only by the calling user.
+      But the temporary file containing pg_dumpall -g
+      output would be group- or world-readable, or even writable, if the
+      user's umask setting allows.  In typical usage on
+      multi-user machines, the umask and/or the working
+      directory's permissions would be tight enough to prevent problems;
+      but there may be people using pg_upgrade
+      in scenarios where this oversight would permit disclosure of database
+      passwords to unfriendly eyes.
+      (CVE-2018-1053)
+     
+    
+
+    
+