1
0
mirror of https://github.com/postgres/postgres.git synced 2025-05-18 17:41:14 +03:00

2924 Commits

Author SHA1 Message Date
Tom Lane
f16cd6ec38 Split the release notes into a separate file for each (active) major branch,
as per my recent proposal.  release.sgml itself is now just a stub that should
change rarely; ideally, only once per major release to add a new include line.
Most editing work will occur in the release-N.N.sgml files.  To update a back
branch for a minor release, just copy the appropriate release-N.N.sgml
file(s) into the back branch.

This commit doesn't change the end-product documentation at all, only the
source layout.  However, it makes it easy to start omitting ancient information
from newer branches' documentation, should we ever decide to do that.
2009-05-02 20:18:21 +00:00
Tom Lane
dbb6d2f959 Update back-branch release notes. 2009-03-12 22:36:46 +00:00
Tom Lane
fc39a00022 Update back-branch release notes. 2009-01-30 00:38:26 +00:00
Tom Lane
e3a4d5cf8c Remove references to pgsql-ports and pgsql-patches mailing lists from
various documentation, since those lists are now dead/deprecated.
Point to pgsql-bugs and/or pgsql-hackers as appropriate.
2009-01-06 17:28:15 +00:00
Tom Lane
ef15b87f45 Update back-branch release notes. 2008-10-30 22:23:39 +00:00
Tom Lane
771374b34b Install a more robust solution for the problem of infinite error-processing
recursion when we are unable to convert a localized error message to the
client's encoding.  We've been over this ground before, but as reported by
Ibrar Ahmed, it still didn't work in the case of conversion failures for
the conversion-failure message itself :-(.  Fix by installing a "circuit
breaker" that disables attempts to localize this message once we get into
recursion trouble.

Patch all supported branches, because it is in fact broken in all of them;
though I had to add some missing translations to the older branches in
order to expose the failure in the particular test case I was using.
2008-10-27 19:37:56 +00:00
Tom Lane
ff1c15e020 Update back-branch release notes. 2008-09-19 02:46:08 +00:00
Tom Lane
d32b17a5fd Fix pg_dump docs to acknowledge that you can use -Z with plain text output. Pointed out by Daniel Migowski. 2008-08-26 00:03:52 +00:00
Tom Lane
ad17600267 Update release notes for 8.3.3 et al. 2008-06-07 22:11:40 +00:00
Tom Lane
bef81252ca Remove link that pre-8.2 doc tools don't support. 2008-06-06 05:34:03 +00:00
Tom Lane
9245557602 Draft release notes for upcoming back-branch updates. 2008-06-04 03:17:01 +00:00
Tom Lane
8b0d5949a8 Improve GRANT documentation to point out that UPDATE and DELETE typically
require SELECT privilege as well, since you normally need to read existing
column values within such commands.  This behavior is according to spec,
but we'd never documented it before.  Per gripe from Volkan Yazici.
2008-05-28 00:46:12 +00:00
Magnus Hagander
e29ed89781 Replace developer FAQ with a reference to the wiki, which is where
it now lives (per discussion). Leave the other FAQs alone for now.
2008-04-22 09:26:34 +00:00
Magnus Hagander
b457536d8f Add link to major version release notes at the top of the minor
version ones, to make it clear to users just browsing the notes
that there are a lot more changes available from whatever version
they are at than what's in the minor version release notes.
2008-04-21 09:44:54 +00:00
Tom Lane
d85096ce12 Fix an ancient oversight in libpq's handling of V3-protocol COPY OUT mode:
we need to be able to swallow NOTICE messages, and potentially also
ParameterStatus messages (although the latter would be a bit weird),
without exiting COPY OUT state.  Fix it, and adjust the protocol documentation
to emphasize the need for this.  Per off-list report from Alexander Galler.
2008-01-14 18:46:49 +00:00
Tom Lane
63ee91fc45 Update release notes for security releases.
Security: CVE-2007-4769, CVE-2007-4772, CVE-2007-6067, CVE-2007-6600, CVE-2007-6601
2008-01-03 21:36:15 +00:00
Tom Lane
230d5cfc47 Make standard maintenance operations (including VACUUM, ANALYZE, REINDEX,
and CLUSTER) execute as the table owner rather than the calling user, using
the same privilege-switching mechanism already used for SECURITY DEFINER
functions.  The purpose of this change is to ensure that user-defined
functions used in index definitions cannot acquire the privileges of a
superuser account that is performing routine maintenance.  While a function
used in an index is supposed to be IMMUTABLE and thus not able to do anything
very interesting, there are several easy ways around that restriction; and
even if we could plug them all, there would remain a risk of reading sensitive
information and broadcasting it through a covert channel such as CPU usage.

To prevent bypassing this security measure, execution of SET SESSION
AUTHORIZATION and SET ROLE is now forbidden within a SECURITY DEFINER context.

Thanks to Itagaki Takahiro for reporting this vulnerability.

Security: CVE-2007-6600
2008-01-03 21:25:34 +00:00
Magnus Hagander
2fb6911f22 Fix invalid ipv6 address in example. Per doc comment 7211. 2008-01-02 19:53:15 +00:00
Tatsuo Ishii
0e7d9e5c50 Fix "Page Layout" table. The second row should be ItemIdData, not
ItemPointerData.
2007-11-23 00:39:59 +00:00
Tom Lane
0a3b51efa0 Update release notes for last-minute fix. 2007-09-16 03:03:55 +00:00
Tom Lane
226b3129f5 Fix markup that doesn't work in back branches. 2007-09-14 16:01:03 +00:00
Tom Lane
b75ac35bfd Minor editorialization on release notes. 2007-09-14 15:51:47 +00:00
Bruce Momjian
59f7d47ed7 Stamp releases 8.2.5, 8.1.10, 8.0.14, 7.4.18, 7.3.20.
Update FAQs for 8.2.5.
2007-09-11 17:36:45 +00:00
Bruce Momjian
465ae004ce Stamp 2007-09-11 17:19:15 +00:00
Peter Eisentraut
86b6abe980 Fix spurious German index entry 2007-05-21 15:00:57 +00:00
Magnus Hagander
7ee0498772 Document that CLUSTER breaks MVCC visibility rules.
(Not needed in cvs head, because CLUSTER itself is fixed there)

Heikki Linnakangas
2007-05-13 16:04:22 +00:00
Neil Conway
414d0d1ecf Fix newly-introduced documentation typo. 2007-04-23 16:53:13 +00:00
Tom Lane
9903eaf7a1 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:28:05 +00:00
Tom Lane
8294203637 Fix markup.
Security: CVE-2007-2138
2007-04-20 03:10:51 +00:00
Tom Lane
eaabaa7e04 Support explicit placement of the temporary-table schema within search_path.
This is needed to allow a security-definer function to set a truly secure
value of search_path.  Without it, a malicious user can use temporary objects
to execute code with the privileges of the security-definer function.  Even
pushing the temp schema to the back of the search path is not quite good
enough, because a function or operator at the back of the path might still
capture control from one nearer the front due to having a more exact datatype
match.  Hence, disable searching the temp schema altogether for functions and
operators.

Security: CVE-2007-2138
2007-04-20 02:38:46 +00:00
Bruce Momjian
f1d934b6b3 Release wording updates for releases 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 13:01:59 +00:00
Bruce Momjian
d62b0e2c1d Update FAQ to mention most recent release for releases
8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19.
2007-04-19 04:04:30 +00:00
Bruce Momjian
9057d27f5d Release note updates for 8.2.4, 8.1.9, 8.0.13, 7.4.17, 7.3.19. 2007-04-19 02:46:46 +00:00
Tom Lane
abeae11765 Update release notes for security-related releases in all active branches.
Security: CVE-2007-0555, CVE-2007-0556
2007-02-02 00:11:02 +00:00
Bruce Momjian
230ae1a106 Fix markup because older releases couldn't link to the reference section. 2007-01-06 04:17:15 +00:00
Bruce Momjian
c1478c8f57 Remove extra character added to top. 2007-01-06 03:36:32 +00:00
Bruce Momjian
77c7616482 Fix markup because lc_numeric didn't have an SGML tag in this release. 2007-01-06 03:14:32 +00:00
Tom Lane
6faab66422 Minor copy-editing for release note updates. 2007-01-05 22:35:13 +00:00
Bruce Momjian
37a86cd254 Stamp release 7.4.15. 2007-01-05 20:53:11 +00:00
Bruce Momjian
e105a651f7 Create release notes for 7.4.15. 2007-01-05 20:02:55 +00:00
Tom Lane
1d5ad22c32 A bit of copy-editing on back-branch release notes. 2006-10-11 20:56:21 +00:00
Bruce Momjian
10d46101f9 Stamp releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:38:34 +00:00
Bruce Momjian
f18ace69dc Update release notes for releases 7.3.16, 7.4.14, 8.0.9, and 8.1.5. 2006-10-09 23:23:11 +00:00
Tom Lane
e0c6d9761c date_trunc also accepts 'quarter'. Noted by Yoshihisa Nakano. 2006-10-01 18:54:57 +00:00
Alvaro Herrera
d7295afe5e Fix confusion between COPY FROM and COPY TO, per Gavin Sharry and Arul Shaji. 2006-07-31 01:09:52 +00:00
Tom Lane
d6a74fe494 Update release notes for upcoming releases. 2006-05-21 21:50:02 +00:00
Bruce Momjian
5421969f72 Stamp releases 7.3.15, 7.4.13, and 8.0.8. 2006-05-21 20:28:26 +00:00
Tom Lane
96871fc236 Modify libpq's string-escaping routines to be aware of encoding considerations
and standard_conforming_strings.  The encoding changes are needed for proper
escaping in multibyte encodings, as per the SQL-injection vulnerabilities
noted in CVE-2006-2313 and CVE-2006-2314.  Concurrent fixes are being applied
to the server to ensure that it rejects queries that may have been corrupted
by attempted SQL injection, but this merely guarantees that unpatched clients
will fail rather than allow injection.  An actual fix requires changing the
client-side code.  While at it we have also fixed these routines to understand
about standard_conforming_strings, so that the upcoming changeover to SQL-spec
string syntax can be somewhat transparent to client code.

Since the existing API of PQescapeString and PQescapeBytea provides no way to
inform them which settings are in use, these functions are now deprecated in
favor of new functions PQescapeStringConn and PQescapeByteaConn.  The new
functions take the PGconn to which the string will be sent as an additional
parameter, and look inside the connection structure to determine what to do.
So as to provide some functionality for clients using the old functions,
libpq stores the latest encoding and standard_conforming_strings values
received from the backend in static variables, and the old functions consult
these variables.  This will work reliably in clients using only one Postgres
connection at a time, or even multiple connections if they all use the same
encoding and string syntax settings; which should cover many practical
scenarios.

Clients that use homebrew escaping methods, such as PHP's addslashes()
function or even hardwired regexp substitution, will require extra effort
to fix :-(.  It is strongly recommended that such code be replaced by use of
PQescapeStringConn/PQescapeByteaConn if at all feasible.
2006-05-21 20:20:24 +00:00
Tom Lane
2e319b0e40 Add a new GUC parameter backslash_quote, which determines whether the SQL
parser will allow "\'" to be used to represent a literal quote mark.  The
"\'" representation has been deprecated for some time in favor of the
SQL-standard representation "''" (two single quote marks), but it has been
used often enough that just disallowing it immediately won't do.  Hence
backslash_quote allows the settings "on", "off", and "safe_encoding",
the last meaning to allow "\'" only if client_encoding is a valid server
encoding.  That is now the default, and the reason is that in encodings
such as SJIS that allow 0x5c (ASCII backslash) to be the last byte of a
multibyte character, accepting "\'" allows SQL-injection attacks as per
CVE-2006-2314 (further details will be published after release).  The
"on" setting is available for backward compatibility, but it must not be
used with clients that are exposed to untrusted input.

Thanks to Akio Ishida and Yasuo Ohgaki for identifying this security issue.
2006-05-21 20:11:58 +00:00
Tom Lane
8cef661bcf Update release notes. 2006-02-12 22:36:05 +00:00