Release date: 2009-12-14
This release contains a variety of fixes from 7.4.26. For information about new features in the 7.4 major release, see Section E.284.
A dump/restore is not required for those running 7.4.X. However, if you are upgrading from a version earlier than 7.4.26, see Section E.258.
Protect against indirect security threats caused by index functions changing session-local state (Gurjeet Singh, Tom)
This change prevents allegedly-immutable index functions from possibly subverting a superuser's session (CVE-2009-4136).
Reject SSL certificates containing an embedded null byte in the common name (CN) field (Magnus)
This prevents unintended matching of a certificate to a server or client name during SSL validation (CVE-2009-4034).
Fix possible crash during backend-startup-time cache initialization (Tom)
Prevent signals from interrupting VACUUM
at unsafe times
(Alvaro)
This fix prevents a PANIC if a VACUUM FULL
is canceled
after it's already committed its tuple movements, as well as transient
errors if a plain VACUUM
is interrupted after having
truncated the table.
Fix possible crash due to integer overflow in hash table size calculation (Tom)
This could occur with extremely large planner estimates for the size of a hashjoin's result.
Fix very rare crash in inet
/cidr
comparisons (Chris
Mikkelson)
Fix PAM password processing to be more robust (Tom)
The previous code is known to fail with the combination of the Linux
pam_krb5
PAM module with Microsoft Active Directory as the
domain controller. It might have problems elsewhere too, since it was
making unjustified assumptions about what arguments the PAM stack would
pass to it.
Make the postmaster ignore any application_name
parameter in
connection request packets, to improve compatibility with future libpq
versions (Tom)