pkgsrc/databases/postgresql74/distinfo
joerg 0eb97e720b Update PostgreSQL to 7.3.15, 7.4.13, 8.0.8 and 8.1.4 respectively.
Common to all versions:
     * Change the server to reject invalidly-encoded multibyte characters
       in all cases (Tatsuo, Tom) While PostgreSQL has been moving in this
       direction for some time, the checks are now applied uniformly to
       all encodings and all textual input, and are now always errors not
       merely warnings. This change defends against SQL-injection attacks
       of the type described in CVE-2006-2313.
     * Reject unsafe uses of \' in string literals As a server-side
       defense against SQL-injection attacks of the type described in
       CVE-2006-2314, the server now only accepts '' and not \' as a
       representation of ASCII single quote in SQL string literals. By
       default, \' is  rejected  only  when  client_encoding is set to a
       client-only encoding (SJIS, BIG5, GBK, GB18030, or UHC), which is
       the scenario in which SQL injection is possible. A new
       configuration parameter backslash_quote is available  to  adjust
       this  behavior  when needed. Note that full security against
       CVE-2006-2314 may require client-side changes; the purpose of
       backslash_quote is in part to make it obvious that insecure clients
       are insecure.
     * Modify libpq's string-escaping routines to be aware of encoding
       considerations This  fixes  libpq-using applications for the
       security issues described in CVE-2006-2313 and CVE-2006-2314.
       Applications that use multiple PostgreSQL connections concurrently
       should migrate to PQescapeStringConn() and PQescapeByteaConn() to
       ensure that escaping is done correctly for the settings in use in
       each database connection. Applications that do string escaping
       "by hand" should be modified to rely on library routines instead.
     * Fix some incorrect encoding conversion functions win1251_to_iso,
       alt_to_iso, euc_tw_to_big5, euc_tw_to_mic, mic_to_euc_tw were all
       broken to varying extents.
     * Clean up stray remaining uses of \' in strings (Bruce, Jan)
     * Fix server to use custom DH SSL parameters correctly (Michael Fuhr)
     * Fix various minor memory leaks

Additionally for 7.4.13 and later:
     * Fix bug that sometimes caused OR'd index scans to miss rows they
       should have returned
     * Fix WAL replay for case where a btree index has been truncated
     * Fix SIMILAR TO for patterns involving | (Tom)
     * Fix for Bonjour on Intel Macs (Ashley Clark)

Additionally for 8.0.8 and 8.1.4:
     * Fix SELECT INTO and CREATE TABLE AS to create tables in the
       default tablespace, not the base directory (Kris Jurka)
     * Fix problem with password prompting on some Win32 systems (Robert
       Kinberg)

Additionally for 8.1.4:
     * Fix weak key selection in pgcrypto (Marko Kreen)
       Errors in fortuna PRNG reseeding logic could cause a predictable
       session key to be selected by pgp_sym_encrypt() in some cases.
       This only affects non-OpenSSL-using builds.
     * Make autovacuum visible in pg_stat_activity (Alvaro)
     * Disable full_page_writes (Tom)
       In certain cases, having full_page_writes off would cause crash
       recovery to fail. A proper fix will appear in 8.2; for now it's
       just disabled.
     * Various planner fixes, particularly for bitmap index scans and
       MIN/MAX optimization (Tom)
     * Fix incorrect optimization in merge join (Tom)
       Outer joins could sometimes emit multiple copies of unmatched
       rows.
     * Fix crash from using and modifying a plpgsql function in the same
       transaction
     * Improve qsort performance (Dann Corbit)
       Currently this code is only used on Solaris.
     * Improve pg_dump's handling of default values for domains
     * Fix pg_dumpall to handle identically-named users and groups
       reasonably (only possible when dumping from a pre-8.1 server) (Tom)
       The user and group will be merged into a single role with LOGIN
       permission. Formerly the merged role wouldn't have LOGIN
       permission, making it unusable as a user.
     * Fix pg_restore -n to work as documented (Tom)
2006-05-26 17:47:58 +00:00

16 lines
911 B
Text

$NetBSD: distinfo,v 1.21 2006/05/26 17:47:58 joerg Exp $
SHA1 (postgresql-7.4.13.tar.bz2) = 32bb03c00e4905d02fc621988d88b075a8a07194
RMD160 (postgresql-7.4.13.tar.bz2) = 8b107ed07fd44814f8559c4803a95e86176f2b63
Size (postgresql-7.4.13.tar.bz2) = 10248808 bytes
SHA1 (patch-aa) = 830a0789195aacd10094e35e7d0d79c5e201491f
SHA1 (patch-ab) = f44a544c56452bad197a88cb827e88624c54656c
SHA1 (patch-ac) = 8104ac7631dd8566eb455e479dd59da058b68c8f
SHA1 (patch-ad) = fae5e82e0943ea982c9d3aace290b56c6a7629f9
SHA1 (patch-ae) = f0e0ad98ebdc972e7c40afd805fbb0d909d5ef3b
SHA1 (patch-af) = 7373db75fda125b980f2ead990719798c0d22a48
SHA1 (patch-ag) = a983f23b5e47a4c2f31ba284ff3db51b53cf8414
SHA1 (patch-ah) = 1a9b565bf3a004da5fa33081bc3675cb938e7e5f
SHA1 (patch-ai) = 158382638ee3380930d6c9fd9b6381e973ccedc2
SHA1 (patch-aj) = 629e38a0ca475834fb0bf1e03cc4efdfca4fb6ce
SHA1 (patch-ak) = 12b4227149ebe4a3516b342c0931de78e3498b2e