6461 Commits

Author SHA1 Message Date
Marc G. Fournier
6de5df1f87 Tag 8.1.23. 2010-12-13 23:06:55 -04:00
Tom Lane
e8b1dd7a67 Update release notes for releases 9.0.2, 8.4.6, 8.3.13, 8.2.19, and 8.1.23. 2010-12-13 20:23:51 -05:00
Tom Lane
6b2c0eab1f Force default wal_sync_method to be fdatasync on Linux.
Recent versions of the Linux system header files cause xlogdefs.h to
believe that open_datasync should be the default sync method, whereas
formerly fdatasync was the default on Linux.  open_datasync is a bad
choice, first because it doesn't actually outperform fdatasync (in fact
the reverse), and second because we try to use O_DIRECT with it, causing
failures on certain filesystems (e.g., ext4 with data=journal option).
This part of the patch is largely per a proposal from Marti Raudsepp.
More extensive changes are likely to follow in HEAD, but this is as much
change as we want to back-patch.

Also clean up confusing code and incorrect documentation surrounding the
fsync_writethrough option.  Those changes shouldn't result in any actual
behavioral change, but I chose to back-patch them anyway to keep the
branches looking similar in this area.

In 9.0 and HEAD, also do some copy-editing on the WAL Reliability
documentation section.

Back-patch to all supported branches, since any of them might get used
on modern Linux versions.
2010-12-08 20:01:33 -05:00
Robert Haas
04daad28c8 Warn that views can be safely used to hide columns, but not rows. 2010-10-08 09:19:22 -04:00
Marc G. Fournier
d6d7926cd1 Tag 8.1.22 2010-10-01 10:37:59 -03:00
Tom Lane
329d7554a6 Use a separate interpreter for each calling SQL userid in plperl and pltcl.
There are numerous methods by which a Perl or Tcl function can subvert
the behavior of another such function executed later; for example, by
redefining standard functions or operators called by the target function.
If the target function is SECURITY DEFINER, or is called by such a
function, this means that any ordinary SQL user with Perl or Tcl language
usage rights can do essentially anything with the privileges of the target
function's owner.

To close this security hole, create a separate Perl or Tcl interpreter for
each SQL userid under which plperl or pltcl functions are executed within
a session.  However, all plperlu or pltclu functions run within a session
still share a single interpreter, since they all execute at the trust
level of a database superuser anyway.

Note: this change results in a functionality loss when libperl has been
built without the "multiplicity" option: it's no longer possible to call
plperl functions under different userids in one session, since such a
libperl can't support multiple interpreters in one process.  However, such
a libperl already failed to support concurrent use of plperl and plperlu,
so it's likely that few people use such versions with Postgres.

Security: CVE-2010-3433
2010-09-30 17:21:59 -04:00
Tom Lane
10fbaf0f94 Update release notes for releases 9.0.1, 8.4.5, 8.3.12, 8.2.18, 8.1.22,
8.0.26, and 7.4.30.
2010-09-30 14:27:51 -04:00
Tom Lane
7c192c9193 Do some copy-editing on the Git usage docs. 2010-09-22 20:22:55 -04:00
Tom Lane
2e75e7082d Fix documentation gitignore for pre-9.0 doc build methods. 2010-09-22 18:26:29 -04:00
Magnus Hagander
706a5809b9 Remove anonymous cvs instructions, and replace them with instructions
for git. Change other references from cvs to git as well.
2010-09-22 20:48:47 +02:00
Magnus Hagander
3fb50a7288 Convert cvsignore to gitignore, and add .gitignore for build targets. 2010-09-22 12:57:17 +02:00
Robert Haas
35f0dccb0d Fix one more incorrect errno definition in the ECPG manual.
Again, back-patch all the way to 7.4.
2010-08-11 19:04:03 +00:00
Robert Haas
19efe0489f Fix incorrect errno definitions in ECPG manual.
ecpgerrno.h hasn't materially changed since PostgreSQL 7.4, so this has
been wrong for a very long time.  Back-patch all the way.

Satoshi Nagayasu
2010-08-11 18:52:52 +00:00
Peter Eisentraut
f6d3301cc8 Fix grammar
backpatched to 8.1
2010-07-26 20:30:07 +00:00
Tom Lane
4d242bb56d Fix assorted misstatements and poor wording in the descriptions of the I/O
formats for geometric types.  Per bug #5536 from Jon Strait, and my own
testing.

Back-patch to all supported branches, since this doco has been wrong right
along -- we certainly haven't changed the I/O behavior of these types in
many years.
2010-07-03 04:03:33 +00:00
Robert Haas
97d136f9e8 Fix longstanding typo in V1 calling conventions documentation.
Erik Rijkers
2010-05-16 03:56:03 +00:00
Tom Lane
7965fd5b0e Improve documentation of pg_restore's -l and -L switches to point out their
interactions with filtering switches, such as -n and -t.  Per a complaint
from Russell Smith.
2010-05-15 18:11:30 +00:00
Marc G. Fournier
30017daeb4 tag 8.1.21 2010-05-14 03:35:26 +00:00
Tom Lane
6499118a90 Update release notes with security issues.
Security: CVE-2010-1169, CVE-2010-1170
2010-05-13 21:27:29 +00:00
Tom Lane
b67abe3db8 Use an entity instead of non-ASCII letter. Thom Brown 2010-05-13 19:16:38 +00:00
Tom Lane
a921879053 Prevent PL/Tcl from loading the "unknown" module from pltcl_modules unless
that is a regular table or view owned by a superuser.  This prevents a
trojan horse attack whereby any unprivileged SQL user could create such a
table and insert code into it that would then get executed in other users'
sessions whenever they call pltcl functions.

Worse yet, because the code was automatically loaded into both the "normal"
and "safe" interpreters at first use, the attacker could execute unrestricted
Tcl code in the "normal" interpreter without there being any pltclu functions
anywhere, or indeed anyone else using pltcl at all: installing pltcl is
sufficient to open the hole.  Change the initialization logic so that the
"unknown" code is only loaded into an interpreter when the interpreter is
first really used.  (That doesn't add any additional security in this
particular context, but it seems a prudent change, and anyway the former
behavior violated the principle of least astonishment.)

Security: CVE-2010-1170
2010-05-13 18:29:37 +00:00
Andrew Dunstan
68e621bfa4 Abandon the use of Perl's Safe.pm to enforce restrictions in plperl, as it is
fundamentally insecure. Instead apply an opmask to the whole interpreter that
imposes restrictions on unsafe operations. These restrictions are much harder
to subvert than is Safe.pm, since there is no container to be broken out of.
Backported to release 7.4.

In releases 7.4, 8.0 and 8.1 this also includes the necessary backporting of
the two interpreters model for plperl and plperlu adopted in release 8.2.

In versions 8.0 and up, the use of Perl's POSIX module to undo its locale
mangling on Windows has become insecure with these changes, so it is
replaced by our own routine, which is also faster.

Nice side effects of the changes include that it is now possible to use perl's
"strict" pragma in a natural way in plperl, and that perl's $a and
$b variables now work as expected in sort routines, and that function
compilation is significantly faster.

Tim Bunce and Andrew Dunstan, with reviews from Alex Hunsaker and
Alexey Klyukin.

Security: CVE-2010-1169
2010-05-13 16:43:41 +00:00
Tom Lane
a65beefa7c Preliminary release notes for releases 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25,
7.4.29.
2010-05-12 23:27:51 +00:00
Peter Eisentraut
2c862fbf23 IP port -> TCP port
backpatched to 8.1, where this first appeared
2010-04-15 20:45:40 +00:00
Magnus Hagander
dbaaca266a Typo fixes.
Fujii Masao
2010-03-17 18:04:14 +00:00
Marc G. Fournier
53690dce27 tag 8.1.20 2010-03-12 03:51:21 +00:00
Tom Lane
e6bef1156a Preliminary release notes for releases 8.4.3, 8.3.10, 8.2.16, 8.1.20, 8.0.24,
7.4.28.
2010-03-10 01:59:02 +00:00
Magnus Hagander
b2dfc2ff10 Add missing space in example.
Tim Landscheidt
2010-03-08 12:39:29 +00:00
Tom Lane
a3609304b7 Back-patch addition of ssl_renegotiation_limit into 7.4 through 8.1. 2010-02-25 23:44:27 +00:00
Marc G. Fournier
c89eec5064 tag 8.1.19 2009-12-10 03:15:17 +00:00
Tom Lane
ce07e3f60e Update release notes for releases 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23,
7.4.27.
2009-12-10 00:31:52 +00:00
Tom Lane
595f2744b0 Fix erroneous handling of shared dependencies (ie dependencies on roles)
in CREATE OR REPLACE FUNCTION.  The original code would update pg_shdepend
as if a new function was being created, even if it wasn't, with two bad
consequences: pg_shdepend might record the wrong owner for the function,
and any dependencies for roles mentioned in the function's ACL would be lost.
The fix is very easy: just don't touch pg_shdepend at all when doing a
function replacement.

Also update the CREATE FUNCTION reference page, which never explained
exactly what changes and doesn't change in a function replacement.
In passing, fix the CREATE VIEW reference page similarly; there's no
code bug there, but the docs didn't say what happens.
2009-10-02 18:13:32 +00:00
Marc G. Fournier
164a8ff822 Tag 8.1.18 2009-09-04 02:59:54 +00:00
Tom Lane
230f752a90 Final updates of release notes for 8.4.1, 8.3.8, 8.2.14, 8.1.18, 8.0.22,
7.4.26.
2009-09-03 22:14:25 +00:00
Bruce Momjian
4c46c3f824 Update release notes for 7.4.26, 8.0.22, 8.1.18, 8.2.14, 8.3.8, 8.4.1. 2009-08-27 01:27:00 +00:00
Bruce Momjian
83108d1551 Remove tabs from SGML. 2009-08-15 20:22:59 +00:00
Andrew Dunstan
076abaf6b9 Re-add documentation for --no-readline option of psql, mistakenly removed a decade ago. Backpatch to release 7.4. 2009-08-10 02:39:16 +00:00
Tom Lane
f8d10e50d3 Split the release notes into a separate file for each (active) major branch,
as per my recent proposal.  release.sgml itself is now just a stub that should
change rarely; ideally, only once per major release to add a new include line.
Most editing work will occur in the release-N.N.sgml files.  To update a back
branch for a minor release, just copy the appropriate release-N.N.sgml
file(s) into the back branch.

This commit doesn't change the end-product documentation at all, only the
source layout.  However, it makes it easy to start omitting ancient information
from newer branches' documentation, should we ever decide to do that.
2009-05-02 20:17:57 +00:00
Marc G. Fournier
023c537f47 tag 8.1.17 2009-03-13 02:22:05 +00:00
Tom Lane
05940d393d Update back-branch release notes. 2009-03-12 22:36:20 +00:00
Marc G. Fournier
55a19fa409 tagging 8.1.16 2009-01-30 03:18:18 +00:00
Tom Lane
998a372ebc Update back-branch release notes. 2009-01-30 00:38:02 +00:00
Bruce Momjian
076b64fe93 Update release notes for 8.3.5, 8.2.11, and 8.1.15 to mention the need
to reindex GiST indexes:

	If you were running a previous 8.X.X release, REINDEX all GiST
	indexes after the upgrade.
2009-01-09 01:46:35 +00:00
Tom Lane
943b6b82a9 Remove references to pgsql-ports and pgsql-patches mailing lists from
various documentation, since those lists are now dead/deprecated.
Point to pgsql-bugs and/or pgsql-hackers as appropriate.
2009-01-06 17:27:50 +00:00
Marc G. Fournier
d8ca7ffbea tag 8.1.15 2008-10-31 02:49:03 +00:00
Tom Lane
09df79e8d7 Update back-branch release notes. 2008-10-30 22:23:11 +00:00
Tom Lane
1b0c30f68d Install a more robust solution for the problem of infinite error-processing
recursion when we are unable to convert a localized error message to the
client's encoding.  We've been over this ground before, but as reported by
Ibrar Ahmed, it still didn't work in the case of conversion failures for
the conversion-failure message itself :-(.  Fix by installing a "circuit
breaker" that disables attempts to localize this message once we get into
recursion trouble.

Patch all supported branches, because it is in fact broken in all of them;
though I had to add some missing translations to the older branches in
order to expose the failure in the particular test case I was using.
2008-10-27 19:37:42 +00:00
Tom Lane
3b25d1650c Fix COPY documentation to not imply that HEADER can be used outside CSV mode.
Per gripe from Bill Thoen.
2008-10-10 21:46:56 +00:00
Marc G. Fournier
00f3091e60 tag for 8.1.14 2008-09-19 03:19:16 +00:00
Tom Lane
81dcd77b81 Update back-branch release notes. 2008-09-19 02:45:44 +00:00