- 02 Feb, 2007 6 commits
-
-
Michael Meskes authored
-
Michael Meskes authored
-
Bruce Momjian authored
> o Allow column display reordering by recording a display, > storage, and permanent id for every column? > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00782.php >
-
Tom Lane authored
Security: CVE-2007-0555, CVE-2007-0556
-
Tom Lane authored
made query plan. Use of ALTER COLUMN TYPE creates a hazard for cached query plans: they could contain Vars that claim a column has a different type than it now has. Fix this by checking during plan startup that Vars at relation scan level match the current relation tuple descriptor. Since at that point we already have at least AccessShareLock, we can be sure the column type will not change underneath us later in the query. However, since a backend's locks do not conflict against itself, there is still a hole for an attacker to exploit: he could try to execute ALTER COLUMN TYPE while a query is in progress in the current backend. Seal that hole by rejecting ALTER TABLE whenever the target relation is already open in the current backend. This is a significant security hole: not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. Our thanks to Jeff Trout for the initial report. Security: CVE-2007-0556
-
Tom Lane authored
we should check that the function code returns the claimed result datatype every time we parse the function for execution. Formerly, for simple scalar result types we assumed the creation-time check was sufficient, but this fails if the function selects from a table that's been redefined since then, and even more obviously fails if check_function_bodies had been OFF. This is a significant security hole: not only can one trivially crash the backend, but with appropriate misuse of pass-by-reference datatypes it is possible to read out arbitrary locations in the server process's memory, which could allow retrieving database content the user should not be able to see. Our thanks to Jeff Trout for the initial report. Security: CVE-2007-0555
-
- 01 Feb, 2007 21 commits
-
-
Tom Lane authored
-
Bruce Momjian authored
"can't" -> "cannot" section.
-
Neil Conway authored
for the recent may/might cleanup.
-
Bruce Momjian authored
shared hardware section, and mention DRBD as a popular solution.
-
Tom Lane authored
-
Neil Conway authored
recent may/might cleanup, in the hopes that this will unbreak the buildfarm. Per report from Stefan Kaltenbrunner.
-
Tom Lane authored
an error will be thrown correctly if the variable is of a NOT NULL domain. Report and almost-correct fix from Sergiy Vyshnevetskiy (bug #2948).
-
Bruce Momjian authored
o Add long file support for binary pg_dump output > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00551.php
-
Bruce Momjian authored
Standard English uses "may", "can", and "might" in different ways: may - permission, "You may borrow my rake." can - ability, "I can lift that log." might - possibility, "It might rain today." Unfortunately, in conversational English, their use is often mixed, as in, "You may use this variable to do X", when in fact, "can" is a better choice. Similarly, "It may crash" is better stated, "It might crash".
-
Neil Conway authored
-
Bruce Momjian authored
behavior has changed.
-
Bruce Momjian authored
Daojing.Zhou
-
Bruce Momjian authored
> > * Tighten function permission checks > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00564.php >
-
Bruce Momjian authored
> > * Tighten trigger permission checks > > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00564.php >
-
Neil Conway authored
and --password for pg_dump, pg_dumpall and pg_restore, per complaint by Michael Schmidt. Patch from Magnus Hagander.
-
Bruce Momjian authored
> > * Fix problem when multiple subtransactions of the same outer transaction > hold different types of locks, and one subtransaction aborts > > http://archives.postgresql.org/pgsql-hackers/2006-11/msg01011.php > http://archives.postgresql.org/pgsql-hackers/2006-12/msg00001.php
-
Neil Conway authored
-
Bruce Momjian authored
created and increments. The old docs created the sequence, then showed a nextval() of 114.
-
Bruce Momjian authored
o Fix RENAME to work on variables other than OLD/NEW > http://archives.postgresql.org/pgsql-hackers/2007-01/msg01615.php
-
Bruce Momjian authored
appropriate.
-
- 31 Jan, 2007 13 commits
-
-
Bruce Momjian authored
Standard English uses "may", "can", and "might" in different ways: may - permission, "You may borrow my rake." can - ability, "I can lift that log." might - possibility, "It might rain today." Unfortunately, in conversational English, their use is often mixed, as in, "You may use this variable to do X", when in fact, "can" is a better choice. Similarly, "It may crash" is better stated, "It might crash".
-
Bruce Momjian authored
-
Bruce Momjian authored
-
Bruce Momjian authored
Standard English uses "may", "can", and "might" in different ways: may - permission, "You may borrow my rake." can - ability, "I can lift that log." might - possibility, "It might rain today." Unfortunately, in conversational English, their use is often mixed, as in, "You may use this variable to do X", when in fact, "can" is a better choice. Similarly, "It may crash" is better stated, "It might crash". Also update two error messages mentioned in the documenation to match.
-
Neil Conway authored
targets, and refactor the tablespace setup code into a separate Makefile target.
-
Neil Conway authored
nonportable "hh" sprintf(3) length modifier. Instead, do the parsing and output by hand. The code to do this isn't ideal, but this is an interim measure anyway: the uuid type should probably use the in-memory struct layout specified by RFC 4122. For now, this patch should hopefully rectify the buildfarm failures for the uuid test. Along the way, re-add pg_cast entries for uuid <-> varchar, which I mistakenly removed earlier, and bump the catversion.
-
Tom Lane authored
or other share-directory files are inaccessible for some reason other than not existing. Inspired by trouble report from Simon Kinsella.
-
Teodor Sigaev authored
-
Teodor Sigaev authored
-
Teodor Sigaev authored
In this case extractQuery should returns -1 as nentries. This changes prototype of extractQuery method to use int32* instead of uint32* for nentries argument. Based on that gincostestimate may see two corner cases: nothing will be found or seqscan should be used. Per proposal at http://archives.postgresql.org/pgsql-hackers/2007-01/msg01581.php PS tsearch_core patch should be sightly modified to support changes, but I'm waiting a verdict about reviewing of tsearch_core patch.
-
Bruce Momjian authored
o Fix RENAME to work on variables other than OLD/NEW > > http://archives.postgresql.org/pgsql-hackers/2002-03/msg00591.php >
-
Bruce Momjian authored
-
Bruce Momjian authored
-