Up to [cvs.NetBSD.org] / pkgsrc / databases / postgresql92-server
Request diff between arbitrary revisions
Keyword substitution: kv
Default branch: MAIN
Removed (jdbc-)postgresql92(-*)
postgresql: updated to the latest The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, and 9.2.24. This release fixes three security issues. This release also fixes issues found in BRIN indexing, logical replication and other bugs reported over the past three months. All users using the affected versions of PostgreSQL should update as soon as possible. If you use BRIN indexes or contrib/start-scripts, please see the release notes for additional post-upgrade steps. Security Issues Three security vulnerabilities have been fixed by this release: CVE-2017-12172: Start scripts permit database administrator to modify root-owned files CVE-2017-15098: Memory disclosure in JSON functions CVE-2017-15099: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges Bug Fixes and Improvements This update also fixes a number of bugs reported in the last few months. Some of these issues affect only version 10, but many affect all supported versions: Fix a race condition in BRIN indexing that could cause some rows to not be included in the indexing. Fix crash when logical decoding is invoked from a PL language function. Several fixes for logical replication. Restored behavior for CTEs attached to INSERT/UPDATE/DELETE statements to pre-version 10. Prevent low-probability crash in processing of nested trigger firings. Do not evaluate an aggregate function's argument expressions when the conditions in the FILTER clause evaluate to FALSE. This complies with SQL-standard behavior. Fix incorrect query results when multiple GROUPING SETS columns contain the same simple variable. Fix memory leak over the lifespan of a query when evaluating a set-returning function from the target list in a SELECT. Several fixes for parallel query execution, including fixing a crash in the parallel execution of certain queries that contain a certain type of bitmap scan. Fix json_build_array(), json_build_object(), jsonb_build_array(), and jsonb_build_object() to handle explicit VARIADIC arguments correctly. Prevent infinite float values from being casted to the numeric type. Fix autovacuum's “work item” logic to prevent possible crashes and silent loss of work items. Several fixes for VIEWs around adding columns to the end of a view. Fix for hashability detection of range data types that are created by a user. Improvements on using extended statistics on columns for the purposes of query planning. Prevent idle_in_transaction_session_timeout from being ignored when a statement_timeout occurred earlier. Fix low-probability loss of NOTIFY messages due more than 2 billion transactions processing before any queries are executed in the session. Several file system interaction fixes. Correctly restore the umask setting when file creation fails in COPY or lo_export(). Fix pg_dump to ensure that it emits GRANT commands in a valid order. Fix pg_basebackup's matching of tablespace paths to canonicalize both paths before comparing to help improve Windows compatibility. Fix libpq to not require user's home directory to exist when trying to read the "~/.pgpass" file. Several fixes for ecpg.
Pullup ticket #5434 - requested by sevan databases/postgresql92: security fix databases/postgresql93: security fix databases/postgresql94: security fix databases/postgresql95: security fix databases/postgresql96: security fix Revisions pulled up: - databases/postgresql92-docs/PLIST 1.21 - databases/postgresql92-server/PLIST 1.13 - databases/postgresql92/Makefile.common 1.28 - databases/postgresql92/distinfo 1.23 - databases/postgresql93-docs/PLIST 1.18 - databases/postgresql93-server/PLIST 1.11 - databases/postgresql93/Makefile.common 1.24 - databases/postgresql93/distinfo 1.23 - databases/postgresql94-client/PLIST 1.3 - databases/postgresql94-docs/PLIST 1.13 - databases/postgresql94-server/PLIST 1.8 - databases/postgresql94/Makefile.common 1.16 - databases/postgresql94/distinfo 1.15 - databases/postgresql95-client/PLIST 1.4 - databases/postgresql95-docs/PLIST 1.7 - databases/postgresql95-server/PLIST 1.6 - databases/postgresql95/Makefile.common 1.9 - databases/postgresql95/distinfo 1.8 - databases/postgresql96-client/PLIST 1.2 - databases/postgresql96-docs/PLIST 1.3 - databases/postgresql96-server/PLIST 1.3 - databases/postgresql96/Makefile.common 1.3 - databases/postgresql96/distinfo 1.4 --- Module Name: pkgsrc Committed By: adam Date: Fri May 12 19:37:55 UTC 2017 Modified Files: pkgsrc/databases/postgresql92: Makefile.common distinfo pkgsrc/databases/postgresql92-docs: PLIST pkgsrc/databases/postgresql92-server: PLIST pkgsrc/databases/postgresql93: Makefile.common distinfo pkgsrc/databases/postgresql93-docs: PLIST pkgsrc/databases/postgresql93-server: PLIST pkgsrc/databases/postgresql94: Makefile.common distinfo pkgsrc/databases/postgresql94-client: PLIST pkgsrc/databases/postgresql94-docs: PLIST pkgsrc/databases/postgresql94-server: PLIST pkgsrc/databases/postgresql95: Makefile.common distinfo pkgsrc/databases/postgresql95-client: PLIST pkgsrc/databases/postgresql95-docs: PLIST pkgsrc/databases/postgresql95-server: PLIST pkgsrc/databases/postgresql96: Makefile.common distinfo pkgsrc/databases/postgresql96-client: PLIST pkgsrc/databases/postgresql96-docs: PLIST pkgsrc/databases/postgresql96-server: PLIST Log Message: The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.3, 9.5.7, 9.4.12, 9.3.17, and 9.2.21. This release fixes three security issues. It also patches a number of other bugs reported over the last three months. Users who use the PGREQUIRESSL environment variable to control connections, and users who rely on security isolation between database users when using foreign servers, should update as soon as possible. Other users should plan to update at the next convenient downtime.
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.3, 9.5.7, 9.4.12, 9.3.17, and 9.2.21. This release fixes three security issues. It also patches a number of other bugs reported over the last three months. Users who use the PGREQUIRESSL environment variable to control connections, and users who rely on security isolation between database users when using foreign servers, should update as soon as possible. Other users should plan to update at the next convenient downtime.
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.2, 9.5.6, 9.4.11, 9.3.16, and 9.2.20. This release includes fixes that prevent data corruption issues in index builds and in certain write-ahead-log replay situations, which are detailed below. It also patches over 75 other bugs reported over the last three months.
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19, and 9.1.24. This is also the last update for the PostgreSQL 9.1 series as it is now end-of-life. This release fixes two issues that can cause data corruption, which are described in more detail below. It also patches a number of other bugs reported over the last three months. The project urges users to apply this update at the next possible downtime.
This release fixes a number of issues reported by users over the last two months. Most database administrators should plan to upgrade at the next available downtime, unless they have been affected directly by the fixed issues.
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.5.2, 9.4.7, 9.3.12, 9.2.16, and 9.1.21. This release fixes two security issues and one index corruption issue in version 9.5. It also contains a variety of bug fixes for earlier versions. Users of PostgreSQL 9.5.0 or 9.5.1 should update as soon as possible. This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query. The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue.
Changes 9.2.14: Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed.
Changes 9.2.10: Security Fixes * CVE-2015-0241 Buffer overruns in "to_char" functions. * CVE-2015-0242 Buffer overrun in replacement printf family of functions. * CVE-2015-0243 Memory errors in functions in the pgcrypto extension. * CVE-2015-0244 An error in extended protocol message reading. * CVE-2014-8161 Constraint violation errors can cause display of values in columns which the user would not normally have rights to see. JSON and JSONB Unicode Escapes Other Fixes and Improvements * Cope with the non-ASCII Norwegian Windows locale name. * Avoid data corruption when databases are moved to new tablespaces and back again. * Ensure that UNLOGGED tables are correctly copied during ALTER DATABASE operations. * Avoid deadlocks when locking recently modified rows. * Fix two SELECT FOR UPDATE query issues. * Prevent false negative for shortest-first regular expression matches. * Fix false positives and negatives in tsquery contains operator. * Fix namespace handling in xpath(). * Prevent row-producing functions from creating empty column names. * Make autovacuum use per-table cost_limit and cost_delay settings. * When autovacuum=off, limit autovacuum work to wraparound prevention only. * Multiple fixes for logical decoding in 9.4. * Fix transient errors on hot standby queries due to page replacement. * Prevent duplicate WAL file archiving at end of recovery or standby promotion. * Prevent deadlock in parallel restore of schema-only dump.
The PostgreSQL Global Development Group has released an update to all supported version of the database system, including versions 9.3.5, 9.2.9, 9.1.14, 9.0.18, and 8.4.22. This minor release fixes a number of issues discovered and reported by users over the last four months, including some data corruption issues, and is the last update of version 8.4. Users of version 9.3 will want to update at the earliest opportunity; users of version 8.4 will want to schedule an upgrade to a supported PostgreSQL version.
Remove example rc.d scripts from PLISTs. These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or ignored otherwise.
Changes: This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. This update also fixes some issues which affect binary replication and row locking, and can cause recoverable data corruption in some cases. In addition to the above, the following issues are fixed in this release: Fix WAL logging of visibility map change Make sure that GIN indexes log all insertions Get pause_at_recovery_target to pause at correct time Ensure walreceiver sends hot-standby feedback messages on time Prevent timeout interrupts from taking control away from mainline code Eliminate several race conditions Fix some broken HINTs in error messages Prevent server lockup on SSL connection loss Fix two Unicode handling issues Prevent crash on certain subselect syntax Prevent crash on select from zero column table Fix two bugs with LATERAL Fix issue with UNION ALL, partitioning, and updates Ensure that ANALYZE understands domains over ranges Eliminate permissions check when using default tablespace Fix memory leakage in JSON functions Allow extensions with event triggers Distinguish numbers correctly in JSON output Fix permissions for pg_start_backup() and pg_stop_backup() Accept SHIFT_JIS as locale name Fix .* expansion for SQL function variables Prevent infinite loop on some COPY connection failures Several fixes for client issues on Windows Enable building PostgreSQL with Visual Studio 2013 Update time zone files for recent changes
Pullup ticket #4112 - requested by fhajny databases/postgresql84: security update databases/postgresql84-client: security update databases/postgresql84-server: security update databases/postgresql90: security update databases/postgresql90-client: security update databases/postgresql90-docs: security update databases/postgresql90-server: security update databases/postgresql91: security update databases/postgresql91-client: security update databases/postgresql91-docs: security update databases/postgresql91-server: security update databases/postgresql92: security update databases/postgresql92-client: security update databases/postgresql92-docs: security update databases/postgresql92-server: security update Revisions pulled up: - databases/Makefile 1.428 - databases/postgresql84-client/PLIST 1.19 - databases/postgresql84-server/PLIST 1.15 - databases/postgresql84/Makefile.common 1.26 - databases/postgresql84/distinfo 1.25 - databases/postgresql90-docs/PLIST 1.15 - databases/postgresql90-server/PLIST 1.12 - databases/postgresql90/Makefile.common 1.24 - databases/postgresql90/distinfo 1.17 - databases/postgresql91-docs/PLIST 1.11 - databases/postgresql91-server/PLIST 1.7 - databases/postgresql91/Makefile.common 1.14 - databases/postgresql91/distinfo 1.14 - databases/postgresql92-client/PLIST 1.4 - databases/postgresql92-docs/PLIST 1.4 - databases/postgresql92-server/PLIST 1.3 - databases/postgresql92/Makefile.common 1.5 - databases/postgresql92/distinfo 1.4 - databases/postgresql92/patches/patch-contrib_dblink_dblink.c 1.2 --- Module Name: pkgsrc Committed By: adam Date: Thu Apr 4 21:08:38 UTC 2013 Modified Files: pkgsrc/databases: Makefile pkgsrc/databases/postgresql84: Makefile.common distinfo pkgsrc/databases/postgresql84-client: PLIST pkgsrc/databases/postgresql84-server: PLIST pkgsrc/databases/postgresql90: Makefile.common distinfo pkgsrc/databases/postgresql90-docs: PLIST pkgsrc/databases/postgresql90-server: PLIST pkgsrc/databases/postgresql91: Makefile.common distinfo pkgsrc/databases/postgresql91-docs: PLIST pkgsrc/databases/postgresql91-server: PLIST pkgsrc/databases/postgresql92: Makefile.common distinfo pkgsrc/databases/postgresql92-client: PLIST pkgsrc/databases/postgresql92-docs: PLIST pkgsrc/databases/postgresql92-server: PLIST pkgsrc/databases/postgresql92/patches: patch-contrib_dblink_dblink.c pkgsrc/mk: pgsql.buildlink3.mk Removed Files: pkgsrc/databases/jdbc-postgresql83: DESCR Makefile PLIST distinfo pkgsrc/databases/postgresql83: DESCR Makefile Makefile.common PLIST distinfo options.mk pkgsrc/databases/postgresql83-client: DESCR Makefile PLIST buildlink3.mk pkgsrc/databases/postgresql83-plperl: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-plpython: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-pltcl: DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-server: DEINSTALL DESCR MESSAGE Makefile PLIST pkgsrc/databases/postgresql83-server/files: pgsql.sh pkgsrc/databases/postgresql83-uuid: Makefile pkgsrc/databases/postgresql83/files: GNUmakefile.libpq dynloader-ltdl.h pkgsrc/databases/postgresql83/patches: patch-aa patch-ab patch-ac patch-ad patch-af patch-ag patch-ah patch-ai patch-ba patch-src_interfaces_ecpg_ecpglib_Makefile patch-src_makefiles_Makefile.solaris patch-src_pl_plperl_plperl.h patch-src_pl_plpgsql_src_Makefile Log Message: The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update immediately. A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902.
The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update immediately. A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902.
The PostgreSQL Global Development Group has released a security update to all current versions of the PostgreSQL database system, including versions 9.2.3, 9.1.8, 9.0.12, 8.4.16, and 8.3.23. This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. This issue was discovered by independent security researcher Sumit Soni this week and reported via Secunia SVCRP, and we are grateful for their efforts in making PostgreSQL more secure. Today's update also fixes a performance regression which caused a decrease in throughput when using dynamic queries in stored procedures in version 9.2. Applications which use PL/pgSQL's EXECUTE are strongly affected by this regression and should be updated. Additionally, we have fixed intermittent crashes caused by CREATE/DROP INDEX CONCURRENTLY, and multiple minor issues with replication. This release is expected to be the final update for version 8.3, which is now End-of-Life (EOL). Users of version 8.3 should plan to upgrade to a later version of PostgreSQL immediately. For more information, see our Versioning Policy. This update release also contains fixes for many minor issues discovered and patched by the PostgreSQL community in the last two months, including: * Prevent unnecessary table scans during vacuuming * Prevent spurious cached plan error in PL/pgSQL * Allow sub-SELECTs to be subscripted * Prevent DROP OWNED from dropping databases or tablespaces * Make ECPG use translated messages * Allow PL/Python to use multi-table trigger functions (again) in 9.1 and 9.2 * Fix several activity log management issues on Windows * Prevent autovacuum file truncation from being cancelled by deadlock_timeout * Make extensions build with the .exe suffix automatically on Windows * Fix concurrency issues with CREATE/DROP DATABASE * Reject out-of-range values in to_date() conversion function * Revert cost estimation for large indexes back to pre-9.2 behavior * Make pg_basebackup tolerate timeline switches * Cleanup leftover temp table entries during crash recovery * Prevent infinite loop when COPY inserts a large tuple into a table with a large fillfactor * Prevent integer overflow in dynahash creation * Make pg_upgrade work with INVALID indexes * Fix bugs in TYPE privileges * Allow Contrib installchecks to run in their own databases * Many documentation updates * Add new timezone "FET".
The PostgreSQL Global Development Group announces PostgreSQL 9.2, the latest release of the leader in open source databases. Since the beta release was announced in May, developers and vendors have praised it as a leap forward in performance, scalability and flexibility. Users are expected to switch to this version in record numbers. PostgreSQL 9.2 will ship with native JSON support, covering indexes, replication and performance improvements, and many more features. We are eagerly awaiting this release and will make it available in Early Access as soon as it’s released by the PostgreSQL community," said Ines Sombra, Lead Data Engineer, Engine Yard.