-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[BACKPORT pg15-cherrypicks] all: Bulk port from master - 60+61
Summary: 5a76f6a [#23179] CDCSDK: Support data types with dynamically alloted oids in CDC 5820ccd [PLAT-14710] Do not return apiToken in response to getSessionInfo dcfa9cd [docs] updates to CVE table status column (#23225) c0b1ee8 [docs] Fix load balance keyword in drivers page (#23253) 2becb46 [docs] Add basic troubleshooting steps for read restart errors. (#23228) 1b9be2e [PLAT-12733] Kubernetes overrides in v2 api 50422f8 [#23011] YSQL: Enable ALTER TABLE IF EXISTS t RENAME c1 TO c2 7c55b95 [PLAT-14073] DB scoped failover+repair 5ac65eb [#22449] YSQL: import wal2json wal2json_2_6 9e046fb [#23163] YSQL: pg_partman: make 'inherit_template_properties' idempotent 2248dcd [#23163] YSQL: pg_partman: make 'apply_publications' idempotent 7b32d05 [#23163] YSQL: pg_partman: Make partition creation idempotent b0349fe [PLAT-14710] update api doc for /session_info fe37ffd [#23240] CDCSDK: Make test replicationConnectionConsumptionAllDataTypes more resilient Test Plan: Jenkins: rebase: pg15-cherrypicks Reviewers: tfoucher Tags: #jenkins-ready Differential Revision: https://phorge.dev.yugabyte.com/D36789
- Loading branch information
Showing
123 changed files
with
11,149 additions
and
388 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,7 +14,7 @@ type: docs | |
|
||
An important part of Yugabyte's strategy for building a secure platform for our users is vulnerability reporting. We value working with the broader security research community and understand that fostering that relationship will help Yugabyte improve its own security posture. We take vulnerabilities very seriously regardless of source, and strongly encourage people to report security vulnerabilities **privately to our security team** before disclosing them in a public forum. Our goal is to surface vulnerabilities and resolve them privately before they can be exploited. | ||
|
||
## Our Commitment | ||
## Our commitment | ||
|
||
1. **In scope** We commit to investigate and address any reported issues, and request that you use the following process for the reporting of security vulnerabilities in the following products: | ||
|
||
|
@@ -30,7 +30,7 @@ An important part of Yugabyte's strategy for building a secure platform for our | |
|
||
1. We assure you that we will not initiate legal action against researchers who are acting in good faith and adhering to this process. | ||
|
||
## The Process | ||
## The process | ||
|
||
1. **Report the Concern.** If you have any security concerns or would like to report undisclosed security vulnerabilities in our products or services, please email us at [[email protected]](mailto:[email protected]). Note that we do not accept bug reports at this address. | ||
|
||
|
@@ -49,7 +49,7 @@ An important part of Yugabyte's strategy for building a secure platform for our | |
|
||
1. **Use Common Sense.** Please use common sense when looking for security issues with our products. Attacking or compromising Yugabyte users' installations, or attacks on our infrastructure are not permitted. | ||
|
||
## Next Steps | ||
## Next steps | ||
|
||
1. We will promptly investigate any reported issue. In certain cases, we may work privately with you to resolve the vulnerability. We may choose not to disclose information publicly while we investigate and mitigate any risk. | ||
|
||
|
@@ -81,18 +81,18 @@ Note that this policy covers only vulnerabilities in the query layer of PostgreS | |
|
||
| Product | Name | Fixed in YugabyteDB version | Status | | ||
| :------ | :--- | :--------------------- | :----- | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10127">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10128">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10127">}} | | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10128">}} | | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10129">}} | [v2.7.1](/preview/releases/ybdb-releases/end-of-life/v2.7/#v2-7-1-1-may-25-2021)| Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10130">}} | [v2.12.11.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.11.0), {{<release "2.14.3.0">}}, {{<release "2.15.4.0">}} | Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10164">}} | [v2.12.11.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.11.0), {{<release "2.14.3.0">}}, {{<release "2.15.3.0">}} | Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10208">}} | [v2.12.11.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.11.0), {{<release "2.14.3.0">}}, {{<release "2.15.4.0">}} | Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10209">}} | [v2.12.11.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.11.0), {{<release "2.14.3.0">}}, {{<release "2.15.4.0">}} | Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10210">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10211">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-3466">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-10733">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-14349">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10210">}} | | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-10211">}} | | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2019-3466">}} | | Not applicable: pg_ctlcluster is not included in installation. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-10733">}} | | Not applicable: YugabyteDB only runs on Linux, this vulnerability is Windows-specific. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-14349">}} | | Not applicable: YugabyteDB does not use logical replication. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-14350">}} | [v2.12.11.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.11.0), {{<release "2.14.5.0">}}, {{<release "2.16.0.0">}}, {{<release "2.17.1.0">}}| Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-1720">}} | | Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2020-25694">}} | [v2.7.1](/preview/releases/ybdb-releases/end-of-life/v2.7/#v2-7-1-1-may-25-2021) or later | Resolved | | ||
|
@@ -111,5 +111,5 @@ Note that this policy covers only vulnerabilities in the query layer of PostgreS | |
| PostgreSQL (YSQL) | {{<cve "CVE-2022-2625">}} | [v2.12.10.0](/preview/releases/ybdb-releases/end-of-life/v2.12/#v2.12.10.0), {{<release "2.14.2.0">}}, {{<release "2.15.3.0">}}| Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2023-2454">}} | {{<release "2.18.1.0">}}| Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2023-2455">}} | {{<release "2.14.10.2">}}, {{<release "2.16.5.0">}}, {{<release "2.18.0.0">}}, {{<release "2.20.0.0">}}| Resolved | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2023-32305">}} | | Not applicable | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2023-32305">}} | | Not applicable: [aiven-extras](https://github.com/aiven/aiven-extras) is not included in installation. | | ||
| PostgreSQL (YSQL) | {{<cve "CVE-2023-39417">}} | {{<release "2.20.1.0">}}, {{<release "2.14.15.0">}}, {{<release "2.16.9.0">}}, {{<release "2.18.5.0">}}| Resolved | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.