1
0
mirror of https://github.com/postgres/postgres.git synced 2025-08-17 01:02:17 +03:00
Commit Graph

3683 Commits

Author SHA1 Message Date
Robert Haas
edf3df60e6 Fix longstanding typo in V1 calling conventions documentation.
Erik Rijkers
2010-05-16 03:55:55 +00:00
Tom Lane
8be5f6ecaa Improve documentation of pg_restore's -l and -L switches to point out their
interactions with filtering switches, such as -n and -t.  Per a complaint
from Russell Smith.
2010-05-15 18:11:35 +00:00
Tom Lane
250956f5b4 Update release notes with security issues.
Security: CVE-2010-1169, CVE-2010-1170
2010-05-13 21:27:35 +00:00
Tom Lane
fdce45308f Use an entity instead of non-ASCII letter. Thom Brown 2010-05-13 19:16:45 +00:00
Tom Lane
ef4e44a374 Prevent PL/Tcl from loading the "unknown" module from pltcl_modules unless
that is a regular table or view owned by a superuser.  This prevents a
trojan horse attack whereby any unprivileged SQL user could create such a
table and insert code into it that would then get executed in other users'
sessions whenever they call pltcl functions.

Worse yet, because the code was automatically loaded into both the "normal"
and "safe" interpreters at first use, the attacker could execute unrestricted
Tcl code in the "normal" interpreter without there being any pltclu functions
anywhere, or indeed anyone else using pltcl at all: installing pltcl is
sufficient to open the hole.  Change the initialization logic so that the
"unknown" code is only loaded into an interpreter when the interpreter is
first really used.  (That doesn't add any additional security in this
particular context, but it seems a prudent change, and anyway the former
behavior violated the principle of least astonishment.)

Security: CVE-2010-1170
2010-05-13 18:29:45 +00:00
Andrew Dunstan
e089e04d3e Abandon the use of Perl's Safe.pm to enforce restrictions in plperl, as it is
fundamentally insecure. Instead apply an opmask to the whole interpreter that
imposes restrictions on unsafe operations. These restrictions are much harder
to subvert than is Safe.pm, since there is no container to be broken out of.
Backported to release 7.4.

In releases 7.4, 8.0 and 8.1 this also includes the necessary backporting of
the two interpreters model for plperl and plperlu adopted in release 8.2.

In versions 8.0 and up, the use of Perl's POSIX module to undo its locale
mangling on Windows has become insecure with these changes, so it is
replaced by our own routine, which is also faster.

Nice side effects of the changes include that it is now possible to use perl's
"strict" pragma in a natural way in plperl, and that perl's $a and
$b variables now work as expected in sort routines, and that function
compilation is significantly faster.

Tim Bunce and Andrew Dunstan, with reviews from Alex Hunsaker and
Alexey Klyukin.

Security: CVE-2010-1169
2010-05-13 16:44:03 +00:00
Tom Lane
e6deec6025 Preliminary release notes for releases 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25,
7.4.29.
2010-05-12 23:27:58 +00:00
Magnus Hagander
6434d08e36 Typo fixes.
Fujii Masao
2010-03-17 18:04:09 +00:00
Tom Lane
c15c8fbc38 Preliminary release notes for releases 8.4.3, 8.3.10, 8.2.16, 8.1.20, 8.0.24,
7.4.28.
2010-03-10 01:59:15 +00:00
Magnus Hagander
098a8a4188 Add missing space in example.
Tim Landscheidt
2010-03-08 12:39:10 +00:00
Tom Lane
118e1cbec2 Back-patch addition of ssl_renegotiation_limit into 7.4 through 8.1. 2010-02-25 23:45:04 +00:00
Tom Lane
69b305279e Update release notes for releases 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23,
7.4.27.
2009-12-10 00:31:59 +00:00
Tom Lane
c377f39ee3 Final updates of release notes for 8.4.1, 8.3.8, 8.2.14, 8.1.18, 8.0.22,
7.4.26.
2009-09-03 22:14:33 +00:00
Bruce Momjian
0ae8a8ed43 Update release notes for 7.4.26, 8.0.22, 8.1.18, 8.2.14, 8.3.8, 8.4.1. 2009-08-27 01:26:51 +00:00
Bruce Momjian
484fe41884 Remove tabs from SGML. 2009-08-15 20:22:50 +00:00
Andrew Dunstan
2c2fb7a2ef Re-add documentation for --no-readline option of psql, mistakenly removed a decade ago. Backpatch to release 7.4. 2009-08-10 02:39:12 +00:00
Tom Lane
1d3942e152 Split the release notes into a separate file for each (active) major branch,
as per my recent proposal.  release.sgml itself is now just a stub that should
change rarely; ideally, only once per major release to add a new include line.
Most editing work will occur in the release-N.N.sgml files.  To update a back
branch for a minor release, just copy the appropriate release-N.N.sgml
file(s) into the back branch.

This commit doesn't change the end-product documentation at all, only the
source layout.  However, it makes it easy to start omitting ancient information
from newer branches' documentation, should we ever decide to do that.
2009-05-02 20:18:09 +00:00
Tom Lane
d92059fe9f Update back-branch release notes. 2009-03-12 22:36:33 +00:00
Tom Lane
e4f5645d72 Update back-branch release notes. 2009-01-30 00:38:14 +00:00
Tom Lane
0cdeea0e54 Remove references to pgsql-ports and pgsql-patches mailing lists from
various documentation, since those lists are now dead/deprecated.
Point to pgsql-bugs and/or pgsql-hackers as appropriate.
2009-01-06 17:28:01 +00:00
Tom Lane
f1ac413466 Update back-branch release notes. 2008-10-30 22:23:25 +00:00
Tom Lane
d24efb83ee Install a more robust solution for the problem of infinite error-processing
recursion when we are unable to convert a localized error message to the
client's encoding.  We've been over this ground before, but as reported by
Ibrar Ahmed, it still didn't work in the case of conversion failures for
the conversion-failure message itself :-(.  Fix by installing a "circuit
breaker" that disables attempts to localize this message once we get into
recursion trouble.

Patch all supported branches, because it is in fact broken in all of them;
though I had to add some missing translations to the older branches in
order to expose the failure in the particular test case I was using.
2008-10-27 19:37:48 +00:00
Tom Lane
9ca010304d Update back-branch release notes. 2008-09-19 02:45:56 +00:00
Tom Lane
c1758175f8 Fix pg_dump docs to acknowledge that you can use -Z with plain text output. Pointed out by Daniel Migowski. 2008-08-26 00:03:43 +00:00
Tom Lane
1a7dadda5a Update release notes for 8.3.3 et al. 2008-06-07 22:11:25 +00:00
Tom Lane
5272652720 Remove link that pre-8.2 doc tools don't support. 2008-06-06 05:33:52 +00:00
Tom Lane
0bb0f77d98 Draft release notes for upcoming back-branch updates. 2008-06-04 03:16:46 +00:00
Tom Lane
4fd6a97c09 Improve GRANT documentation to point out that UPDATE and DELETE typically
require SELECT privilege as well, since you normally need to read existing
column values within such commands.  This behavior is according to spec,
but we'd never documented it before.  Per gripe from Volkan Yazici.
2008-05-28 00:46:05 +00:00
Magnus Hagander
a357880dde Replace developer FAQ with a reference to the wiki, which is where
it now lives (per discussion). Leave the other FAQs alone for now.
2008-04-22 09:26:36 +00:00
Magnus Hagander
e5fc7184ce Add link to major version release notes at the top of the minor
version ones, to make it clear to users just browsing the notes
that there are a lot more changes available from whatever version
they are at than what's in the minor version release notes.
2008-04-21 09:44:59 +00:00
Tom Lane
aff5af7dad Fix an ancient oversight in libpq's handling of V3-protocol COPY OUT mode:
we need to be able to swallow NOTICE messages, and potentially also
ParameterStatus messages (although the latter would be a bit weird),
without exiting COPY OUT state.  Fix it, and adjust the protocol documentation
to emphasize the need for this.  Per off-list report from Alexander Galler.
2008-01-14 18:46:40 +00:00
Tom Lane
b161e26de6 Update release notes for security releases.
Security: CVE-2007-4769, CVE-2007-4772, CVE-2007-6067, CVE-2007-6600, CVE-2007-6601
2008-01-03 21:36:02 +00:00
Tom Lane
108b19d860 Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,
and CLUSTER) execute as the table owner rather than the calling user, using
the same privilege-switching mechanism already used for SECURITY DEFINER
functions.  The purpose of this change is to ensure that user-defined
functions used in index definitions cannot acquire the privileges of a
superuser account that is performing routine maintenance.  While a function
used in an index is supposed to be IMMUTABLE and thus not able to do anything
very interesting, there are several easy ways around that restriction; and
even if we could plug them all, there would remain a risk of reading sensitive
information and broadcasting it through a covert channel such as CPU usage.

To prevent bypassing this security measure, execution of SET SESSION
AUTHORIZATION and SET ROLE is now forbidden within a SECURITY DEFINER context.

Thanks to Itagaki Takahiro for reporting this vulnerability.

Security: CVE-2007-6600
2008-01-03 21:25:00 +00:00
Magnus Hagander
0e9888b90d Fix invalid ipv6 address in example. Per doc comment 7211. 2008-01-02 19:53:17 +00:00
Tatsuo Ishii
2f5a7506c6 Fix "Overall Page Layout" table. The second row should be ItemIdData, not
ItemPointerData.
2007-11-23 00:35:44 +00:00
Tom Lane
ef00409020 Make archive recovery always start a new timeline, rather than only when a
recovery stop time was used.  This avoids a corner-case risk of trying to
overwrite an existing archived copy of the last WAL segment, and seems
simpler and cleaner all around than the original definition.  Per example
from Jon Colverson and subsequent analysis by Simon.
2007-09-29 01:36:39 +00:00
Tom Lane
038f7e4afb Update release notes for last-minute fix. 2007-09-16 03:03:40 +00:00
Tom Lane
d620f2d383 Fix markup that doesn't work in back branches. 2007-09-14 16:04:35 +00:00
Tom Lane
42765a29f9 Minor editorialization on release notes. 2007-09-14 15:51:31 +00:00
Bruce Momjian
37ac2f6d1f Stamp releases 8.2.5, 8.1.10, 8.0.14, 7.4.18, 7.3.20.
Update FAQs for 8.2.5.
2007-09-11 17:36:57 +00:00
Bruce Momjian
30099c28f0 Stamp 2007-09-11 17:19:25 +00:00
Tom Lane
94dc2d8e3b Fix array_dims() example to be consistent with the data previously shown.
Christian Rossow
2007-06-07 14:50:18 +00:00
Peter Eisentraut
e7933588eb Fix spurious German index entry 2007-05-21 15:06:44 +00:00
Magnus Hagander
8e0bcdc855 Document that CLUSTER breaks MVCC visibility rules.
(Not needed in cvs head, because CLUSTER itself is fixed there)

Heikki Linnakangas
2007-05-13 16:04:28 +00:00
Neil Conway
d221ef7bdf Fix newly-introduced documentation typo. 2007-04-23 16:53:09 +00:00
Tom Lane
cfe1b04c66 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:27:54 +00:00
Tom Lane
566331a2e9 Support explicit placement of the temporary-table schema within search_path.
This is needed to allow a security-definer function to set a truly secure
value of search_path.  Without it, a malicious user can use temporary objects
to execute code with the privileges of the security-definer function.  Even
pushing the temp schema to the back of the search path is not quite good
enough, because a function or operator at the back of the path might still
capture control from one nearer the front due to having a more exact datatype
match.  Hence, disable searching the temp schema altogether for functions and
operators.

Security: CVE-2007-2138
2007-04-20 02:38:33 +00:00
Bruce Momjian
77be1e891d Release wording updates for releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 13:02:15 +00:00
Bruce Momjian
447b2b9220 Update FAQ to mention most recent release for releases
8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19.
2007-04-19 04:04:41 +00:00
Bruce Momjian
a7ce947b63 Release note updates for 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 02:47:01 +00:00