From 8339895d8f797d8d1ccbd555937ed8cc727ea279 Mon Sep 17 00:00:00 2001 From: Tom Lane Date: Mon, 17 Jun 2019 10:53:45 -0400 Subject: [PATCH] Last-minute updates for release notes. Security: CVE-2019-10164 --- doc/src/sgml/release-10.sgml | 51 ++++++++++++++++++++++++++---------- 1 file changed, 37 insertions(+), 14 deletions(-) diff --git a/doc/src/sgml/release-10.sgml b/doc/src/sgml/release-10.sgml index 5f5e6f4c4a6..126a89e4076 100644 --- a/doc/src/sgml/release-10.sgml +++ b/doc/src/sgml/release-10.sgml @@ -35,6 +35,43 @@ + + Fix buffer-overflow hazards in SCRAM verifier parsing + (Jonathan Katz, Heikki Linnakangas, Michael Paquier) + + + + Any authenticated user could cause a stack-based buffer overflow by + changing their own password to a purpose-crafted value. In addition + to the ability to crash the PostgreSQL + server, this could suffice for executing arbitrary code as + the PostgreSQL operating system account. + + + + A similar overflow hazard existed + in libpq, which could allow a rogue + server to crash a client or perhaps execute arbitrary code as the + client's operating system account. + + + + The PostgreSQL Project thanks Alexander + Lakhin for reporting this problem. (CVE-2019-10164) + + + + + - - Avoid spurious deadlock failures when upgrading a tuple lock (Oleksii - Kliukin) - - - - -