<itemizedlist>
+ <listitem>
+ <para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
<listitem>
<para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
<itemizedlist>
+ <listitem>
+ <para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
<listitem>
<para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
<itemizedlist>
+ <listitem>
+ <para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
+ Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
+ that isn't just <literal>SELECT * FROM ...</literal>
+ (Dean Rasheed, Amit Langote)
+ </para>
+
+ <para>
+ Erroneous expansion of an updatable view could lead to crashes
+ or <quote>attribute ... has the wrong type</quote> errors, if the
+ view's <literal>SELECT</literal> list doesn't match one-to-one with
+ the underlying table's columns.
+ Furthermore, this bug could be leveraged to allow updates of columns
+ that an attacking user lacks <literal>UPDATE</literal> privilege for,
+ if that user has <literal>INSERT</literal> and <literal>UPDATE</literal>
+ privileges for some other column(s) of the table.
+ Any user could also use it for disclosure of server memory.
+ (CVE-2018-10925)
+ </para>
+ </listitem>
+
<listitem>
<para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
</para>
</listitem>
- <listitem>
- <para>
- Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
- that isn't just <literal>SELECT * FROM ...</literal>
- (Dean Rasheed, Amit Langote)
- </para>
-
- <para>
- Erroneous expansion of an updatable view could lead to crashes
- or <quote>attribute ... has the wrong type</quote> errors, if the
- view's <literal>SELECT</literal> list doesn't match one-to-one with
- the underlying table's columns.
- </para>
- </listitem>
-
<listitem>
<para>
Ensure a table's cached index list is correctly rebuilt after an index
<itemizedlist>
+ <listitem>
+ <para>
+ Fix failure to reset <application>libpq</application>'s state fully
+ between connection attempts (Tom Lane)
+ </para>
+
+ <para>
+ An unprivileged user of <filename>dblink</filename>
+ or <filename>postgres_fdw</filename> could bypass the checks intended
+ to prevent use of server-side credentials, such as
+ a <filename>~/.pgpass</filename> file owned by the operating-system
+ user running the server. Servers allowing peer authentication on
+ local connections are particularly vulnerable. Other attacks such
+ as SQL injection into a <filename>postgres_fdw</filename> session
+ are also possible.
+ Attacking <filename>postgres_fdw</filename> in this way requires the
+ ability to create a foreign server object with selected connection
+ parameters, but any user with access to <filename>dblink</filename>
+ could exploit the problem.
+ In general, an attacker with the ability to select the connection
+ parameters for a <application>libpq</application>-using application
+ could cause mischief, though other plausible attack scenarios are
+ harder to think of.
+ Our thanks to Andrew Krasichkov for reporting this issue.
+ (CVE-2018-10915)
+ </para>
+ </listitem>
+
+ <listitem>
+ <para>
+ Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
+ that isn't just <literal>SELECT * FROM ...</literal>
+ (Dean Rasheed, Amit Langote)
+ </para>
+
+ <para>
+ Erroneous expansion of an updatable view could lead to crashes
+ or <quote>attribute ... has the wrong type</quote> errors, if the
+ view's <literal>SELECT</literal> list doesn't match one-to-one with
+ the underlying table's columns.
+ Furthermore, this bug could be leveraged to allow updates of columns
+ that an attacking user lacks <literal>UPDATE</literal> privilege for,
+ if that user has <literal>INSERT</literal> and <literal>UPDATE</literal>
+ privileges for some other column(s) of the table.
+ Any user could also use it for disclosure of server memory.
+ (CVE-2018-10925)
+ </para>
+ </listitem>
+
<listitem>
<para>
Ensure that updates to the <structfield>relfrozenxid</structfield>
</para>
</listitem>
- <listitem>
- <para>
- Fix <literal>INSERT ... ON CONFLICT UPDATE</literal> through a view
- that isn't just <literal>SELECT * FROM ...</literal>
- (Dean Rasheed, Amit Langote)
- </para>
-
- <para>
- Erroneous expansion of an updatable view could lead to crashes
- or <quote>attribute ... has the wrong type</quote> errors, if the
- view's <literal>SELECT</literal> list doesn't match one-to-one with
- the underlying table's columns.
- </para>
- </listitem>
-
<listitem>
<para>
Ensure a table's cached index list is correctly rebuilt after an index