1
0
mirror of https://github.com/postgres/postgres.git synced 2025-07-03 20:02:46 +03:00
Commit Graph

4479 Commits

Author SHA1 Message Date
0a3b51efa0 Update release notes for last-minute fix. 2007-09-16 03:03:55 +00:00
226b3129f5 Fix markup that doesn't work in back branches. 2007-09-14 16:01:03 +00:00
b75ac35bfd Minor editorialization on release notes. 2007-09-14 15:51:47 +00:00
59f7d47ed7 Stamp releases 8.2.5, 8.1.10, 8.0.14, 7.4.18, 7.3.20.
Update FAQs for 8.2.5.
2007-09-11 17:36:45 +00:00
465ae004ce Stamp 2007-09-11 17:19:15 +00:00
86b6abe980 Fix spurious German index entry 2007-05-21 15:00:57 +00:00
7ee0498772 Document that CLUSTER breaks MVCC visibility rules.
(Not needed in cvs head, because CLUSTER itself is fixed there)

Heikki Linnakangas
2007-05-13 16:04:22 +00:00
414d0d1ecf Fix newly-introduced documentation typo. 2007-04-23 16:53:13 +00:00
9903eaf7a1 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:28:05 +00:00
8294203637 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:10:51 +00:00
eaabaa7e04 Support explicit placement of the temporary-table schema within search_path.
This is needed to allow a security-definer function to set a truly secure
value of search_path.  Without it, a malicious user can use temporary objects
to execute code with the privileges of the security-definer function.  Even
pushing the temp schema to the back of the search path is not quite good
enough, because a function or operator at the back of the path might still
capture control from one nearer the front due to having a more exact datatype
match.  Hence, disable searching the temp schema altogether for functions and
operators.

Security: CVE-2007-2138
2007-04-20 02:38:46 +00:00
f1d934b6b3 Release wording updates for releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 13:01:59 +00:00
d62b0e2c1d Update FAQ to mention most recent release for releases
8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19.
2007-04-19 04:04:30 +00:00
f199177461 Stamp releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 03:06:37 +00:00
9057d27f5d Release note updates for 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 02:46:46 +00:00
de59c01f26 Stamp release 7.4.16.
Security: CVE-2007-0555, CVE-2007-0556
2007-02-02 00:15:35 +00:00
abeae11765 Update release notes for security-related releases in all active branches.
Security: CVE-2007-0555, CVE-2007-0556
2007-02-02 00:11:02 +00:00
230ae1a106 Fix markup because older releases couldn't link to the reference section. 2007-01-06 04:17:15 +00:00
c1478c8f57 Remove extra character added to top. 2007-01-06 03:36:32 +00:00
77c7616482 Fix markup because lc_numeric didn't have an SGML tag in this release. 2007-01-06 03:14:32 +00:00
6faab66422 Minor copy-editing for release note updates. 2007-01-05 22:35:13 +00:00
37a86cd254 Stamp release 7.4.15. 2007-01-05 20:53:11 +00:00
e105a651f7 Create release notes for 7.4.15. 2007-01-05 20:02:55 +00:00
1d5ad22c32 A bit of copy-editing on back-branch release notes. 2006-10-11 20:56:21 +00:00
10d46101f9 Stamp releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:38:34 +00:00
f18ace69dc Update release notes for releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:23:11 +00:00
e0c6d9761c date_trunc also accepts 'quarter'. Noted by Yoshihisa Nakano. 2006-10-01 18:54:57 +00:00
d7295afe5e Fix confusion between COPY FROM and COPY TO, per Gavin Sharry and Arul Shaji. 2006-07-31 01:09:52 +00:00
edec862bb6 Costmetic fix for bug template version stamp. 2006-05-22 01:34:20 +00:00
d6a74fe494 Update release notes for upcoming releases. 2006-05-21 21:50:02 +00:00
5421969f72 Stamp releases 7.3.15, 7.4.13, and 8.0.8. 2006-05-21 20:28:26 +00:00
96871fc236 Modify libpq's string-escaping routines to be aware of encoding considerations
and standard_conforming_strings.  The encoding changes are needed for proper
escaping in multibyte encodings, as per the SQL-injection vulnerabilities
noted in CVE-2006-2313 and CVE-2006-2314.  Concurrent fixes are being applied
to the server to ensure that it rejects queries that may have been corrupted
by attempted SQL injection, but this merely guarantees that unpatched clients
will fail rather than allow injection.  An actual fix requires changing the
client-side code.  While at it we have also fixed these routines to understand
about standard_conforming_strings, so that the upcoming changeover to SQL-spec
string syntax can be somewhat transparent to client code.

Since the existing API of PQescapeString and PQescapeBytea provides no way to
inform them which settings are in use, these functions are now deprecated in
favor of new functions PQescapeStringConn and PQescapeByteaConn.  The new
functions take the PGconn to which the string will be sent as an additional
parameter, and look inside the connection structure to determine what to do.
So as to provide some functionality for clients using the old functions,
libpq stores the latest encoding and standard_conforming_strings values
received from the backend in static variables, and the old functions consult
these variables.  This will work reliably in clients using only one Postgres
connection at a time, or even multiple connections if they all use the same
encoding and string syntax settings; which should cover many practical
scenarios.

Clients that use homebrew escaping methods, such as PHP's addslashes()
function or even hardwired regexp substitution, will require extra effort
to fix :-(.  It is strongly recommended that such code be replaced by use of
PQescapeStringConn/PQescapeByteaConn if at all feasible.
2006-05-21 20:20:24 +00:00
2e319b0e40 Add a new GUC parameter backslash_quote, which determines whether the SQL
parser will allow "\'" to be used to represent a literal quote mark.  The
"\'" representation has been deprecated for some time in favor of the
SQL-standard representation "''" (two single quote marks), but it has been
used often enough that just disallowing it immediately won't do.  Hence
backslash_quote allows the settings "on", "off", and "safe_encoding",
the last meaning to allow "\'" only if client_encoding is a valid server
encoding.  That is now the default, and the reason is that in encodings
such as SJIS that allow 0x5c (ASCII backslash) to be the last byte of a
multibyte character, accepting "\'" allows SQL-injection attacks as per
CVE-2006-2314 (further details will be published after release).  The
"on" setting is available for backward compatibility, but it must not be
used with clients that are exposed to untrusted input.

Thanks to Akio Ishida and Yasuo Ohgaki for identifying this security issue.
2006-05-21 20:11:58 +00:00
8cef661bcf Update release notes. 2006-02-12 22:36:05 +00:00
86b2da894a Update FAQ latest version 2006-02-12 18:50:26 +00:00
81c303c514 Stamp releases for 2006-02-14 release 2006-02-12 18:41:39 +00:00
dd56158eef Update release notes for 2006-02-14 release 2006-02-12 18:23:22 +00:00
e9b0c2d4bd Release-note updates and copy editing. 2006-01-06 03:00:34 +00:00
f1f15af055 New pgcrypto item wording. 2006-01-05 15:17:40 +00:00
877ecee373 Wording improvements. 2006-01-05 15:11:33 +00:00
f8c7c069b5 Improve markup. 2006-01-05 14:52:58 +00:00
721205b51c *** empty log message *** 2006-01-05 05:22:09 +00:00
12693c6476 Stamp release 7.4.11. 2006-01-05 03:59:48 +00:00
9c8c45e218 Stamp 7.4.10. 2005-12-09 20:53:26 +00:00
c8457e0fb8 Add release notes for back branches (7.3 and up).
Also minor improvements to 8.1.1 release notes.
2005-12-09 20:40:56 +00:00
d45693fb55 Documentation fix: s/event_object_name/event_object_table/g 2005-12-08 20:44:18 +00:00
48fabd257f Properly document return value of strpos(). 2005-11-16 03:56:52 +00:00
31d276d0ed COPY's test for read-only transaction was backward; it prohibited COPY TO
where it should prohibit COPY FROM.  Found by Alon Goldshuv.
2005-10-03 23:43:45 +00:00
4082f5e34f Stamp release 7.4.9. 2005-10-03 17:14:24 +00:00
fd366be49a Update release notes for pending back-branch releases. 2005-10-03 16:05:09 +00:00