diff --git a/doc/src/sgml/release-11.sgml b/doc/src/sgml/release-11.sgml index c6a13e98bd..bb66ef07dc 100644 --- a/doc/src/sgml/release-11.sgml +++ b/doc/src/sgml/release-11.sgml @@ -35,6 +35,73 @@ + + Set a secure search_path in logical replication + walsenders and apply workers (Noah Misch) + + + + A malicious user of either the publisher or subscriber database + could potentially cause execution of arbitrary SQL code by the role + running replication, which is often a superuser. Some of the risks + here are equivalent to those described in CVE-2018-1058, and are + mitigated in this patch by ensuring that the replication sender and + receiver execute with empty search_path settings. + (As with CVE-2018-1058, that change might cause problems for + under-qualified names used in replicated tables' DDL.) Other risks + are inherent in replicating objects that belong to untrusted roles; + the most we can do is document that there is a hazard to consider. + (CVE-2020-14349) + + + + + + + Make contrib modules' installation scripts more secure (Tom Lane) + + + + Attacks similar to those described in CVE-2018-1058 could be carried + out against an extension installation script, if the attacker can + create objects in either the extension's target schema or the schema + of some prerequisite extension. Since extensions often require + superuser privilege to install, this can open a path to obtaining + superuser privilege. To mitigate this risk, be more careful about + the search_path used to run an installation + script; disable check_function_bodies within the + script; and fix catalog-adjustment queries used in some contrib + modules to ensure they are secure. Also provide documentation to + help third-party extension authors make their installation scripts + secure. This is not a complete solution; extensions that depend on + other extensions can still be at risk if installed carelessly. + (CVE-2020-14350) + + + + +