1
0
mirror of https://github.com/postgres/postgres.git synced 2025-05-17 06:41:24 +03:00

4487 Commits

Author SHA1 Message Date
Magnus Hagander
e29ed89781 Replace developer FAQ with a reference to the wiki, which is where
it now lives (per discussion). Leave the other FAQs alone for now.
2008-04-22 09:26:34 +00:00
Magnus Hagander
b457536d8f Add link to major version release notes at the top of the minor
version ones, to make it clear to users just browsing the notes
that there are a lot more changes available from whatever version
they are at than what's in the minor version release notes.
2008-04-21 09:44:54 +00:00
Tom Lane
d85096ce12 Fix an ancient oversight in libpq's handling of V3-protocol COPY OUT mode:
we need to be able to swallow NOTICE messages, and potentially also
ParameterStatus messages (although the latter would be a bit weird),
without exiting COPY OUT state.  Fix it, and adjust the protocol documentation
to emphasize the need for this.  Per off-list report from Alexander Galler.
2008-01-14 18:46:49 +00:00
Tom Lane
56a2a41763 Stamp release 7.4.19.
Security: CVE-2007-4769, CVE-2007-4772, CVE-2007-6067, CVE-2007-6600, CVE-2007-6601
2008-01-03 21:42:17 +00:00
Tom Lane
63ee91fc45 Update release notes for security releases.
Security: CVE-2007-4769, CVE-2007-4772, CVE-2007-6067, CVE-2007-6600, CVE-2007-6601
2008-01-03 21:36:15 +00:00
Tom Lane
230d5cfc47 Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,
and CLUSTER) execute as the table owner rather than the calling user, using
the same privilege-switching mechanism already used for SECURITY DEFINER
functions.  The purpose of this change is to ensure that user-defined
functions used in index definitions cannot acquire the privileges of a
superuser account that is performing routine maintenance.  While a function
used in an index is supposed to be IMMUTABLE and thus not able to do anything
very interesting, there are several easy ways around that restriction; and
even if we could plug them all, there would remain a risk of reading sensitive
information and broadcasting it through a covert channel such as CPU usage.

To prevent bypassing this security measure, execution of SET SESSION
AUTHORIZATION and SET ROLE is now forbidden within a SECURITY DEFINER context.

Thanks to Itagaki Takahiro for reporting this vulnerability.

Security: CVE-2007-6600
2008-01-03 21:25:34 +00:00
Magnus Hagander
2fb6911f22 Fix invalid ipv6 address in example. Per doc comment 7211. 2008-01-02 19:53:15 +00:00
Tatsuo Ishii
0e7d9e5c50 Fix "Page Layout" table. The second row should be ItemIdData, not
ItemPointerData.
2007-11-23 00:39:59 +00:00
Tom Lane
0a3b51efa0 Update release notes for last-minute fix. 2007-09-16 03:03:55 +00:00
Tom Lane
226b3129f5 Fix markup that doesn't work in back branches. 2007-09-14 16:01:03 +00:00
Tom Lane
b75ac35bfd Minor editorialization on release notes. 2007-09-14 15:51:47 +00:00
Bruce Momjian
59f7d47ed7 Stamp releases 8.2.5, 8.1.10, 8.0.14, 7.4.18, 7.3.20.
Update FAQs for 8.2.5.
2007-09-11 17:36:45 +00:00
Bruce Momjian
465ae004ce Stamp 2007-09-11 17:19:15 +00:00
Peter Eisentraut
86b6abe980 Fix spurious German index entry 2007-05-21 15:00:57 +00:00
Magnus Hagander
7ee0498772 Document that CLUSTER breaks MVCC visibility rules.
(Not needed in cvs head, because CLUSTER itself is fixed there)

Heikki Linnakangas
2007-05-13 16:04:22 +00:00
Neil Conway
414d0d1ecf Fix newly-introduced documentation typo. 2007-04-23 16:53:13 +00:00
Tom Lane
9903eaf7a1 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:28:05 +00:00
Tom Lane
8294203637 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:10:51 +00:00
Tom Lane
eaabaa7e04 Support explicit placement of the temporary-table schema within search_path.
This is needed to allow a security-definer function to set a truly secure
value of search_path.  Without it, a malicious user can use temporary objects
to execute code with the privileges of the security-definer function.  Even
pushing the temp schema to the back of the search path is not quite good
enough, because a function or operator at the back of the path might still
capture control from one nearer the front due to having a more exact datatype
match.  Hence, disable searching the temp schema altogether for functions and
operators.

Security: CVE-2007-2138
2007-04-20 02:38:46 +00:00
Bruce Momjian
f1d934b6b3 Release wording updates for releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 13:01:59 +00:00
Bruce Momjian
d62b0e2c1d Update FAQ to mention most recent release for releases
8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19.
2007-04-19 04:04:30 +00:00
Bruce Momjian
f199177461 Stamp releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 03:06:37 +00:00
Bruce Momjian
9057d27f5d Release note updates for 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 02:46:46 +00:00
Tom Lane
de59c01f26 Stamp release 7.4.16.
Security: CVE-2007-0555, CVE-2007-0556
2007-02-02 00:15:35 +00:00
Tom Lane
abeae11765 Update release notes for security-related releases in all active branches.
Security: CVE-2007-0555, CVE-2007-0556
2007-02-02 00:11:02 +00:00
Bruce Momjian
230ae1a106 Fix markup because older releases couldn't link to the reference section. 2007-01-06 04:17:15 +00:00
Bruce Momjian
c1478c8f57 Remove extra character added to top. 2007-01-06 03:36:32 +00:00
Bruce Momjian
77c7616482 Fix markup because lc_numeric didn't have an SGML tag in this release. 2007-01-06 03:14:32 +00:00
Tom Lane
6faab66422 Minor copy-editing for release note updates. 2007-01-05 22:35:13 +00:00
Bruce Momjian
37a86cd254 Stamp release 7.4.15. 2007-01-05 20:53:11 +00:00
Bruce Momjian
e105a651f7 Create release notes for 7.4.15. 2007-01-05 20:02:55 +00:00
Tom Lane
1d5ad22c32 A bit of copy-editing on back-branch release notes. 2006-10-11 20:56:21 +00:00
Bruce Momjian
10d46101f9 Stamp releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:38:34 +00:00
Bruce Momjian
f18ace69dc Update release notes for releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:23:11 +00:00
Tom Lane
e0c6d9761c date_trunc also accepts 'quarter'. Noted by Yoshihisa Nakano. 2006-10-01 18:54:57 +00:00
Alvaro Herrera
d7295afe5e Fix confusion between COPY FROM and COPY TO, per Gavin Sharry and Arul Shaji. 2006-07-31 01:09:52 +00:00
Bruce Momjian
edec862bb6 Costmetic fix for bug template version stamp. 2006-05-22 01:34:20 +00:00
Tom Lane
d6a74fe494 Update release notes for upcoming releases. 2006-05-21 21:50:02 +00:00
Bruce Momjian
5421969f72 Stamp releases 7.3.15, 7.4.13, and 8.0.8. 2006-05-21 20:28:26 +00:00
Tom Lane
96871fc236 Modify libpq's string-escaping routines to be aware of encoding considerations
and standard_conforming_strings.  The encoding changes are needed for proper
escaping in multibyte encodings, as per the SQL-injection vulnerabilities
noted in CVE-2006-2313 and CVE-2006-2314.  Concurrent fixes are being applied
to the server to ensure that it rejects queries that may have been corrupted
by attempted SQL injection, but this merely guarantees that unpatched clients
will fail rather than allow injection.  An actual fix requires changing the
client-side code.  While at it we have also fixed these routines to understand
about standard_conforming_strings, so that the upcoming changeover to SQL-spec
string syntax can be somewhat transparent to client code.

Since the existing API of PQescapeString and PQescapeBytea provides no way to
inform them which settings are in use, these functions are now deprecated in
favor of new functions PQescapeStringConn and PQescapeByteaConn.  The new
functions take the PGconn to which the string will be sent as an additional
parameter, and look inside the connection structure to determine what to do.
So as to provide some functionality for clients using the old functions,
libpq stores the latest encoding and standard_conforming_strings values
received from the backend in static variables, and the old functions consult
these variables.  This will work reliably in clients using only one Postgres
connection at a time, or even multiple connections if they all use the same
encoding and string syntax settings; which should cover many practical
scenarios.

Clients that use homebrew escaping methods, such as PHP's addslashes()
function or even hardwired regexp substitution, will require extra effort
to fix :-(.  It is strongly recommended that such code be replaced by use of
PQescapeStringConn/PQescapeByteaConn if at all feasible.
2006-05-21 20:20:24 +00:00
Tom Lane
2e319b0e40 Add a new GUC parameter backslash_quote, which determines whether the SQL
parser will allow "\'" to be used to represent a literal quote mark.  The
"\'" representation has been deprecated for some time in favor of the
SQL-standard representation "''" (two single quote marks), but it has been
used often enough that just disallowing it immediately won't do.  Hence
backslash_quote allows the settings "on", "off", and "safe_encoding",
the last meaning to allow "\'" only if client_encoding is a valid server
encoding.  That is now the default, and the reason is that in encodings
such as SJIS that allow 0x5c (ASCII backslash) to be the last byte of a
multibyte character, accepting "\'" allows SQL-injection attacks as per
CVE-2006-2314 (further details will be published after release).  The
"on" setting is available for backward compatibility, but it must not be
used with clients that are exposed to untrusted input.

Thanks to Akio Ishida and Yasuo Ohgaki for identifying this security issue.
2006-05-21 20:11:58 +00:00
Tom Lane
8cef661bcf Update release notes. 2006-02-12 22:36:05 +00:00
Bruce Momjian
86b2da894a Update FAQ latest version 2006-02-12 18:50:26 +00:00
Bruce Momjian
81c303c514 Stamp releases for 2006-02-14 release 2006-02-12 18:41:39 +00:00
Bruce Momjian
dd56158eef Update release notes for 2006-02-14 release 2006-02-12 18:23:22 +00:00
Tom Lane
e9b0c2d4bd Release-note updates and copy editing. 2006-01-06 03:00:34 +00:00
Bruce Momjian
f1f15af055 New pgcrypto item wording. 2006-01-05 15:17:40 +00:00
Bruce Momjian
877ecee373 Wording improvements. 2006-01-05 15:11:33 +00:00
Bruce Momjian
f8c7c069b5 Improve markup. 2006-01-05 14:52:58 +00:00
Bruce Momjian
721205b51c *** empty log message *** 2006-01-05 05:22:09 +00:00