Updated EDB Windows + macOS installers pages for PG12
[pgweb/local.git] / templates / security / security.html
blob1466fc3b4615eea8416cd1570b0767bf78fe624c
1 {%extends "base/page.html"%}
2 {%block title%}Security Information{%endblock%}
3 {%block contents%}
5 <h1>Security Information <i class="fas fa-lock"></i></h1>
7 <p>
8 If you wish to report a new security vulnerability in PostgreSQL, please
9 send an email to
10 <a href="mailto:security@postgresql.org">security@postgresql.org</a>.
11 For reporting non-security bugs, please see the <a href="/account/submitbug/">Report a Bug</a> page.
12 </p>
14 {%if version and not version.supported%}
15 <h1>UNSUPPORTED VERSION</h1>
16 <p>
17 You are currently viewing security issues for an unsupported version. If
18 you are still using PostgreSQL version {{version}}, you should upgrade as
19 soon as possible!
20 </p>
21 {%else%}
22 <p>
24 The PostgreSQL Global Development Group (PGDG) takes security seriously,
25 allowing our users to place their trust in the web sites and applications
26 built around PostgreSQL. Our approach covers fail-safe configuration options,
27 a secure and robust database server as well as good integration with other
28 security infrastructure software.
29 </p>
31 <p>
32 PostgreSQL security updates are primarily made available as <a href="/support/versioning/">minor version</a>
33 upgrades. You are always advised to use the latest minor version available,
34 as it will likely also contain other non-security related fixes. All known
35 security issues are always fixed in the next major release, when it comes out.
36 </p>
38 <p>
39 PGDG believes that accuracy, completeness and availability of security
40 information is essential for our users. We choose to pool all information on
41 this one page, allowing easy searching for vulnerabilities by a range of
42 criteria.
43 </p>
45 <p>
46 Vulnerabilities list which major releases they were present
47 in, and which version they are fixed in for each. If the vulnerability
48 was exploitable without a valid login, this is also stated. They also
49 list a vulnerability class, but we urge all users to read the description
50 to determine if the bug affects specific installations or not.
51 </p>
53 {%endif%}
55 <h2>Known security issues in {%if version%}version {{version.numtree}}{%else%}all supported versions{%endif%}</h2>
56 <p>
57 You can filter the view of patches to show just patches for version:<br/>
58 {%for v in supported%}
59 <a href="/support/security/{{v.numtree}}/">{{v.numtree}}</a>{%if not forloop.last%} -{%endif%}
60 {%endfor%}
61 - <a href="/support/security/">all</a>
62 </p>
64 <table class="table table-striped">
65 <thead class="thead-light">
66 <tr>
67 <th>Reference</th>
68 <th>Affected</th>
69 <th>Fixed</th>
70 <th><a href="#comp">Component</a> & CVSS v3 Base Score</th>
71 <th>Description</th>
72 </tr>
73 </thead>
74 <tbody>
75 {%for p in patches%}
76 <tr>
77 <td>
78 {%if p.cve%}<nobr>{%if p.cve_visible%}<a href="{{p.cvelink}}">CVE-{{p.cve}}</a>{%else%}CVE-{{p.cve}}{%endif%}</nobr><br/>{%endif%}
79 {%if p.newspost%}<a href="/about/news/{{p.newspost.id}}/">Announcement</a><br/>{%endif%}
80 </td>
81 <td>{{p.affected|join:", "}}</td>
82 <td>{{p.fixed|join:", "}}</td>
83 <td>{{p.component}}<br/>
84 {%if p.cvssscore >= 0%}<a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector={{p.cvssvector}}">{{p.cvssscore}}</a><br/><span class="cvssvector">{{p.cvssvector}}</span>
85 {%else%}Legacy: {{p.legacyscore}}{%endif%}</td>
86 <td>{{p.description}}{%if p.detailslink%}<br/><br/><a href="{{p.detailslink}}">more details</a>{%endif%}</td>
87 </tr>
88 {% endfor %}
89 </tbody>
90 </table>
92 <h3>Unsupported versions</h3>
93 <p>
94 You can also view archived security patches for unsupported versions. Note that no further
95 security patches are made available for these versions as they are end of life.<br/>
96 {%for v in unsupported%}
97 <a href="/support/security/{{v.numtree}}/">{{v.numtree}}</a>{%if not forloop.last%} -{%endif%}
98 {%endfor%}
99 </p>
102 <a name="comp"></a>
103 <h2>Components</h2>
105 The following component references are used in the above table:
106 </p>
108 <table class="table table-striped">
109 <thead class="thead-light">
110 <tr>
111 <th>Component</th>
112 <th>Description</th>
113 </tr>
114 </thead>
115 <tbody>
116 <tr>
117 <td>core server</td>
118 <td>This vulnerability exists in the core server product.</td>
119 </tr>
121 <tr>
122 <td>client</td>
123 <td>This vulnerability exists in a client library or client application only.</td>
124 </tr>
126 <tr>
127 <td>contrib module</td>
128 <td>This vulnerability exists in a contrib module. Contrib modules are not installed by default when PostgreSQL is installed from source. They may be installed by binary packages.</td>
129 </tr>
131 <tr>
132 <td>client contrib module</td>
133 <td>This vulnerability exists in a contrib module used on the client only.</td>
134 </tr>
136 <tr>
137 <td>packaging</td>
138 <td>This vulnerability exists in PostgreSQL binary packaging, e.g. an installer or RPM.</td>
139 </tr>
140 </tbody>
141 </table>
144 {%endblock%}