From 60b75c69395deba12b49799930d47c5634297beb Mon Sep 17 00:00:00 2001 From: Tom Lane Date: Thu, 10 Dec 2009 00:31:44 +0000 Subject: [PATCH] Update release notes for releases 8.4.2, 8.3.9, 8.2.15, 8.1.19, 8.0.23, 7.4.27. --- doc/src/sgml/release-7.4.sgml | 122 ++++++++++++++++- doc/src/sgml/release-8.0.sgml | 157 +++++++++++++++++++++- doc/src/sgml/release-8.1.sgml | 183 ++++++++++++++++++++++++- doc/src/sgml/release-8.2.sgml | 246 +++++++++++++++++++++++++++++++++- 4 files changed, 704 insertions(+), 4 deletions(-) diff --git a/doc/src/sgml/release-7.4.sgml b/doc/src/sgml/release-7.4.sgml index 70d0e28c5d1..b897f1b8d6e 100644 --- a/doc/src/sgml/release-7.4.sgml +++ b/doc/src/sgml/release-7.4.sgml @@ -1,6 +1,126 @@ - + + + Release 7.4.27 + + + Release date + 2009-12-14 + + + + This release contains a variety of fixes from 7.4.26. + For information about new features in the 7.4 major release, see + . + + + + Migration to Version 7.4.27 + + + A dump/restore is not required for those running 7.4.X. + However, if you are upgrading from a version earlier than 7.4.26, + see the release notes for 7.4.26. + + + + + + Changes + + + + + + Protect against indirect security threats caused by index functions + changing session-local state (Gurjeet Singh, Tom) + + + + This change prevents allegedly-immutable index functions from possibly + subverting a superuser's session (CVE-2009-4136). + + + + + + Reject SSL certificates containing an embedded null byte in the common + name (CN) field (Magnus) + + + + This prevents unintended matching of a certificate to a server or client + name during SSL validation (CVE-2009-4034). + + + + + + Fix possible crash during backend-startup-time cache initialization (Tom) + + + + + + Prevent signals from interrupting VACUUM at unsafe times + (Alvaro) + + + + This fix prevents a PANIC if a VACUUM FULL is cancelled + after it's already committed its tuple movements, as well as transient + errors if a plain VACUUM is interrupted after having + truncated the table. + + + + + + Fix possible crash due to integer overflow in hash table size + calculation (Tom) + + + + This could occur with extremely large planner estimates for the size of + a hashjoin's result. + + + + + + Fix very rare crash in inet/cidr comparisons (Chris + Mikkelson) + + + + + + Fix PAM password processing to be more robust (Tom) + + + + The previous code is known to fail with the combination of the Linux + pam_krb5 PAM module with Microsoft Active Directory as the + domain controller. It might have problems elsewhere too, since it was + making unjustified assumptions about what arguments the PAM stack would + pass to it. + + + + + + Make the postmaster ignore any application_name parameter in + connection request packets, to improve compatibility with future libpq + versions (Tom) + + + + + + + + Release 7.4.26 diff --git a/doc/src/sgml/release-8.0.sgml b/doc/src/sgml/release-8.0.sgml index 3f3d6109154..64d562dd7ce 100644 --- a/doc/src/sgml/release-8.0.sgml +++ b/doc/src/sgml/release-8.0.sgml @@ -1,6 +1,161 @@ - + + + Release 8.0.23 + + + Release date + 2009-12-14 + + + + This release contains a variety of fixes from 8.0.22. + For information about new features in the 8.0 major release, see + . + + + + Migration to Version 8.0.23 + + + A dump/restore is not required for those running 8.0.X. + However, if you are upgrading from a version earlier than 8.0.22, + see the release notes for 8.0.22. + + + + + + Changes + + + + + + Protect against indirect security threats caused by index functions + changing session-local state (Gurjeet Singh, Tom) + + + + This change prevents allegedly-immutable index functions from possibly + subverting a superuser's session (CVE-2009-4136). + + + + + + Reject SSL certificates containing an embedded null byte in the common + name (CN) field (Magnus) + + + + This prevents unintended matching of a certificate to a server or client + name during SSL validation (CVE-2009-4034). + + + + + + Fix possible crash during backend-startup-time cache initialization (Tom) + + + + + + Prevent signals from interrupting VACUUM at unsafe times + (Alvaro) + + + + This fix prevents a PANIC if a VACUUM FULL is cancelled + after it's already committed its tuple movements, as well as transient + errors if a plain VACUUM is interrupted after having + truncated the table. + + + + + + Fix possible crash due to integer overflow in hash table size + calculation (Tom) + + + + This could occur with extremely large planner estimates for the size of + a hashjoin's result. + + + + + + Fix very rare crash in inet/cidr comparisons (Chris + Mikkelson) + + + + + + Fix premature drop of temporary files used for a cursor that is accessed + within a subtransaction (Heikki) + + + + + + Fix PAM password processing to be more robust (Tom) + + + + The previous code is known to fail with the combination of the Linux + pam_krb5 PAM module with Microsoft Active Directory as the + domain controller. It might have problems elsewhere too, since it was + making unjustified assumptions about what arguments the PAM stack would + pass to it. + + + + + + Fix rare crash in exception processing in PL/Python (Peter) + + + + + + Ensure psql's flex module is compiled with the correct + system header definitions (Tom) + + + + This fixes build failures on platforms where + --enable-largefile causes incompatible changes in the + generated code. + + + + + + Make the postmaster ignore any application_name parameter in + connection request packets, to improve compatibility with future libpq + versions (Tom) + + + + + + Update time zone data files to tzdata release 2009s + for DST law changes in Antarctica, Argentina, Bangladesh, Fiji, + Novokuznetsk, Pakistan, Palestine, Samoa, Syria; also historical + corrections for Hong Kong. + + + + + + + + Release 8.0.22 diff --git a/doc/src/sgml/release-8.1.sgml b/doc/src/sgml/release-8.1.sgml index 372ceea84e2..5eadd7cb086 100644 --- a/doc/src/sgml/release-8.1.sgml +++ b/doc/src/sgml/release-8.1.sgml @@ -1,6 +1,187 @@ - + + + Release 8.1.19 + + + Release date + 2009-12-14 + + + + This release contains a variety of fixes from 8.1.18. + For information about new features in the 8.1 major release, see + . + + + + Migration to Version 8.1.19 + + + A dump/restore is not required for those running 8.1.X. + However, if you are upgrading from a version earlier than 8.1.18, + see the release notes for 8.1.18. + + + + + + Changes + + + + + + Protect against indirect security threats caused by index functions + changing session-local state (Gurjeet Singh, Tom) + + + + This change prevents allegedly-immutable index functions from possibly + subverting a superuser's session (CVE-2009-4136). + + + + + + Reject SSL certificates containing an embedded null byte in the common + name (CN) field (Magnus) + + + + This prevents unintended matching of a certificate to a server or client + name during SSL validation (CVE-2009-4034). + + + + + + Fix possible crash during backend-startup-time cache initialization (Tom) + + + + + + Prevent signals from interrupting VACUUM at unsafe times + (Alvaro) + + + + This fix prevents a PANIC if a VACUUM FULL is cancelled + after it's already committed its tuple movements, as well as transient + errors if a plain VACUUM is interrupted after having + truncated the table. + + + + + + Fix possible crash due to integer overflow in hash table size + calculation (Tom) + + + + This could occur with extremely large planner estimates for the size of + a hashjoin's result. + + + + + + Fix very rare crash in inet/cidr comparisons (Chris + Mikkelson) + + + + + + Ensure that shared tuple-level locks held by prepared transactions are + not ignored (Heikki) + + + + + + Fix premature drop of temporary files used for a cursor that is accessed + within a subtransaction (Heikki) + + + + + + Fix PAM password processing to be more robust (Tom) + + + + The previous code is known to fail with the combination of the Linux + pam_krb5 PAM module with Microsoft Active Directory as the + domain controller. It might have problems elsewhere too, since it was + making unjustified assumptions about what arguments the PAM stack would + pass to it. + + + + + + Fix processing of ownership dependencies during CREATE OR + REPLACE FUNCTION (Tom) + + + + + + Ensure that Perl arrays are properly converted to + PostgreSQL arrays when returned by a set-returning + PL/Perl function (Andrew Dunstan, Abhijit Menon-Sen) + + + + This worked correctly already for non-set-returning functions. + + + + + + Fix rare crash in exception processing in PL/Python (Peter) + + + + + + Ensure psql's flex module is compiled with the correct + system header definitions (Tom) + + + + This fixes build failures on platforms where + --enable-largefile causes incompatible changes in the + generated code. + + + + + + Make the postmaster ignore any application_name parameter in + connection request packets, to improve compatibility with future libpq + versions (Tom) + + + + + + Update time zone data files to tzdata release 2009s + for DST law changes in Antarctica, Argentina, Bangladesh, Fiji, + Novokuznetsk, Pakistan, Palestine, Samoa, Syria; also historical + corrections for Hong Kong. + + + + + + + + Release 8.1.18 diff --git a/doc/src/sgml/release-8.2.sgml b/doc/src/sgml/release-8.2.sgml index ba72f860004..de74000d88a 100644 --- a/doc/src/sgml/release-8.2.sgml +++ b/doc/src/sgml/release-8.2.sgml @@ -1,6 +1,250 @@ - + + + Release 8.2.15 + + + Release date + 2009-12-14 + + + + This release contains a variety of fixes from 8.2.14. + For information about new features in the 8.2 major release, see + . + + + + Migration to Version 8.2.15 + + + A dump/restore is not required for those running 8.2.X. + However, if you are upgrading from a version earlier than 8.2.14, + see the release notes for 8.2.14. + + + + + + Changes + + + + + + Protect against indirect security threats caused by index functions + changing session-local state (Gurjeet Singh, Tom) + + + + This change prevents allegedly-immutable index functions from possibly + subverting a superuser's session (CVE-2009-4136). + + + + + + Reject SSL certificates containing an embedded null byte in the common + name (CN) field (Magnus) + + + + This prevents unintended matching of a certificate to a server or client + name during SSL validation (CVE-2009-4034). + + + + + + Fix possible crash during backend-startup-time cache initialization (Tom) + + + + + + Prevent signals from interrupting VACUUM at unsafe times + (Alvaro) + + + + This fix prevents a PANIC if a VACUUM FULL is cancelled + after it's already committed its tuple movements, as well as transient + errors if a plain VACUUM is interrupted after having + truncated the table. + + + + + + Fix possible crash due to integer overflow in hash table size + calculation (Tom) + + + + This could occur with extremely large planner estimates for the size of + a hashjoin's result. + + + + + + Fix very rare crash in inet/cidr comparisons (Chris + Mikkelson) + + + + + + Ensure that shared tuple-level locks held by prepared transactions are + not ignored (Heikki) + + + + + + Fix premature drop of temporary files used for a cursor that is accessed + within a subtransaction (Heikki) + + + + + + Fix incorrect logic for GiST index page splits, when the split depends + on a non-first column of the index (Paul Ramsey) + + + + + + Don't error out if recycling or removing an old WAL file fails at the + end of checkpoint (Heikki) + + + + It's better to treat the problem as non-fatal and allow the checkpoint + to complete. Future checkpoints will retry the removal. Such problems + are not expected in normal operation, but have been seen to be + caused by misdesigned Windows anti-virus and backup software. + + + + + + Ensure WAL files aren't repeatedly archived on Windows (Heikki) + + + + This is another symptom that could happen if some other process + interfered with deletion of a no-longer-needed file. + + + + + + Fix PAM password processing to be more robust (Tom) + + + + The previous code is known to fail with the combination of the Linux + pam_krb5 PAM module with Microsoft Active Directory as the + domain controller. It might have problems elsewhere too, since it was + making unjustified assumptions about what arguments the PAM stack would + pass to it. + + + + + + Fix processing of ownership dependencies during CREATE OR + REPLACE FUNCTION (Tom) + + + + + + Fix bug with calling plperl from plperlu or vice + versa (Tom) + + + + An error exit from the inner function could result in crashes due to + failure to re-select the correct Perl interpreter for the outer function. + + + + + + Fix session-lifespan memory leak when a PL/Perl function is redefined + (Tom) + + + + + + Ensure that Perl arrays are properly converted to + PostgreSQL arrays when returned by a set-returning + PL/Perl function (Andrew Dunstan, Abhijit Menon-Sen) + + + + This worked correctly already for non-set-returning functions. + + + + + + Fix rare crash in exception processing in PL/Python (Peter) + + + + + + Ensure psql's flex module is compiled with the correct + system header definitions (Tom) + + + + This fixes build failures on platforms where + --enable-largefile causes incompatible changes in the + generated code. + + + + + + Make the postmaster ignore any application_name parameter in + connection request packets, to improve compatibility with future libpq + versions (Tom) + + + + + + Update the timezone abbreviation files to match current reality (Joachim + Wieland) + + + + This includes adding IDT and SGT to the default + timezone abbreviation set. + + + + + + Update time zone data files to tzdata release 2009s + for DST law changes in Antarctica, Argentina, Bangladesh, Fiji, + Novokuznetsk, Pakistan, Palestine, Samoa, Syria; also historical + corrections for Hong Kong. + + + + + + + + Release 8.2.14