Release date: 2009-12-14
This release contains a variety of fixes from 7.4.26. For information about new features in the 7.4 major release, see Section E.294.
A dump/restore is not required for those running 7.4.X. However, if you are upgrading from a version earlier than 7.4.26, see Section E.268.
Protect against indirect security threats caused by index functions changing session-local state (Gurjeet Singh, Tom)
This change prevents allegedly-immutable index functions from possibly subverting a superuser's session (CVE-2009-4136).
Reject SSL certificates containing an embedded null byte in the common name (CN) field (Magnus)
This prevents unintended matching of a certificate to a server or client name during SSL validation (CVE-2009-4034).
Fix possible crash during backend-startup-time cache initialization (Tom)
Prevent signals from interrupting VACUUM
at unsafe times (Alvaro)
This fix prevents a PANIC if a VACUUM
FULL
is canceled after it's already committed its tuple
movements, as well as transient errors if a plain VACUUM
is interrupted after having truncated the
table.
Fix possible crash due to integer overflow in hash table size calculation (Tom)
This could occur with extremely large planner estimates for the size of a hashjoin's result.
Fix very rare crash in inet
/cidr
comparisons
(Chris Mikkelson)
Fix PAM password processing to be more robust (Tom)
The previous code is known to fail with the combination of the
Linux pam_krb5
PAM module with
Microsoft Active Directory as the domain controller. It might have
problems elsewhere too, since it was making unjustified assumptions
about what arguments the PAM stack would pass to it.
Make the postmaster ignore any application_name
parameter in connection request
packets, to improve compatibility with future libpq versions
(Tom)
If you see anything in the documentation that is not correct, does not match your experience with the particular feature or requires further clarification, please use this form to report a documentation issue.