The NetBSD Project

CVS log for pkgsrc/databases/postgresql95-client/Attic/Makefile

[BACK] Up to [cvs.NetBSD.org] / pkgsrc / databases / postgresql95-client

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.23, Mon May 24 08:28:11 2021 UTC (2 years, 4 months ago) by adam
Branch: MAIN
CVS Tags: HEAD
Changes since 1.22: +1 -1 lines
FILE REMOVED

postgresql95: removed; EOL

Revision 1.22 / (download) - annotate - [select for diffs], Sat May 22 10:08:48 2021 UTC (2 years, 4 months ago) by nia
Branch: MAIN
Changes since 1.21: +2 -1 lines
Diff to previous 1.21 (colored)

postgresql95: Revert backwards time warp.

Revision 1.21 / (download) - annotate - [select for diffs], Tue May 18 11:56:20 2021 UTC (2 years, 4 months ago) by adam
Branch: MAIN
Changes since 1.20: +1 -2 lines
Diff to previous 1.20 (colored)

postgresql: updated to 13.3, 12.7, 11.12, 10.17, 9.6.22

PostgreSQL 13.3, 12.7, 11.12, 10.17, and 9.6.22 Released!

Posted on 2021-05-13 by PostgreSQL Global Development Group
 PostgreSQL Project  Security
The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 13.3, 12.7, 11.12, 10.17, and 9.6.22. This release closes three security vulnerabilities and fixes over 45 bugs reported over the last three months.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-32027: Buffer overrun from integer overflow in array subscripting calculations

Versions Affected: 9.6 - 13. The security team typically does not test unsupported versions, but this problem is quite old.

While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory.

The PostgreSQL project thanks Tom Lane for reporting this problem.

CVE-2021-32028: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

Versions Affected: 9.6 - 13. The security team typically does not test unsupported versions. The feature first appeared in 9.5.

Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an attacker can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can create prerequisite objects and complete this attack at will. A user lacking the CREATE and TEMPORARY privileges on all databases and the CREATE privilege on all schemas cannot use this attack at will.

The PostgreSQL project thanks Andres Freund for reporting this problem.

CVE-2021-32029: Memory disclosure in partitioned-table UPDATE ... RETURNING

Versions Affected: 11 - 13

Using an UPDATE ... RETURNING on a purpose-crafted partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can create prerequisite objects and complete this attack at will. A user lacking the CREATE and TEMPORARY privileges on all databases and the CREATE privilege on all schemas typically cannot use this attack at will.

The PostgreSQL project thanks Tom Lane for reporting this problem.

Bug Fixes and Improvements

This update fixes over 45 bugs that were reported in the last several months. Some of these issues only affect version 13, but could also apply to other supported versions.

Some of these fixes include:

Fix potential incorrect computation of UPDATE ... RETURNING outputs for joined, cross-partition updates.
Fix ALTER TABLE ... ALTER CONSTRAINT when used on foreign-key constraints on partitioned tables. The command would fail to adjust the DEFERRABLE and/or INITIALLY DEFERRED properties of the constraints and triggers of leaf partitions, leading to unexpected behavior. After updating to this version, you can execute the ALTER TABLE ... ALTER CONSTRAINT command to fix any misbehaving partitioned tables.
Ensure that when a child table is attached with ALTER TABLE ... INHERIT that generated columns in the parent are generated in the same way in the child.
Forbid marking an identity column as NULL.
Allow ALTER ROLE ... SET/ALTER DATABASE ... SET to set the role, session_authorization, and temp_buffers parameters.
Ensure that REINDEX CONCURRENTLY preserves any statistics target set for the index.
Fix an issue where, in some cases, saving records within AFTER triggers could cause crashes.
Fix how to_char() handles Roman-numeral month format codes with negative intervals.
Fix use of uninitialized value while parsing an \{m,n\} quantifier in a BRE-mode regular expression.
Fix "could not find pathkey item to sort" planner errors that occur in some situations when the sort key involves an aggregate or window function.
Fix issue with BRIN index bitmap scans that could lead to "could not open file" errors.
Fix potentially wrong answers from GIN tsvector index searches when there are many matching records.
Fixes for COMMIT AND CHAIN functionality on both the server and psql.
Avoid incorrect timeline change while recovering uncommitted two-phase transactions from WAL, which could lead to consistency issues and the inability to restart the server.
Ensure thatwal_sync_method is set to fdatasync by default on newer FreeBSD releases.
Disable the vacuum_cleanup_index_scale_factor parameter and storage option.
Fix several memory leaks in the server, including one with SSL/TLS parameter initialization.
Restore the previous behavior of \connect service=XYZ to psql, i.e. disallow environmental variables (e.g. PGPORT) from overriding entries in the service file.
Fix how pg_dump handles generated columns in partitioned tables.
Add additional checks to pg_upgrade for user tables containing non-upgradable data types.
On Windows, initdb now prints instructions about how to start the server with pg_ctl using backslash separators.
Fix pg_waldump to count XACT records correctly when generating per-record statistics.

Revision 1.20 / (download) - annotate - [select for diffs], Wed Apr 21 11:41:18 2021 UTC (2 years, 5 months ago) by adam
Branch: MAIN
Changes since 1.19: +2 -1 lines
Diff to previous 1.19 (colored)

revbump for textproc/icu

Revision 1.19 / (download) - annotate - [select for diffs], Mon Feb 15 18:58:40 2021 UTC (2 years, 7 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2021Q1-base, pkgsrc-2021Q1
Changes since 1.18: +1 -2 lines
Diff to previous 1.18 (colored)

postgresql: updated to 13.2, 12.6, 11.11, 10.16, 9.6.21, and 9.5.25

The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 13.2, 12.6, 11.11, 10.16, 9.6.21, and 9.5.25. This release closes two security vulnerabilities and fixes over 80 bugs reported over the last three months.

Additionally, this is the final release of PostgreSQL 9.5. If you are running PostgreSQL 9.5 in a production environment, we suggest that you make plans to upgrade.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-3393: Partition constraint violation errors leak values of denied columns

Versions Affected: 11 - 13.

A user having an UPDATE privilege on a partitioned table but lacking the SELECT privilege on some column may be able to acquire denied-column values from an error message. This is similar to CVE-2014-8161, but the conditions to exploit are more rare.

The PostgreSQL project thanks Heikki Linnakangas for reporting this problem.

CVE-2021-20229: Single-column SELECT privilege enables reading all columns

Versions Affected: 13.

A user having a SELECT privilege on an individual column can craft a special query that returns all columns of the table.

Additionally, a stored view that uses column-level privileges will have incomplete column-usage bitmaps. In installations that depend on column-level permissions for security, it is recommended to execute CREATE OR REPLACE on all user-defined views to force them to be re-parsed.

The PostgreSQL project thanks Sven Klemm for reporting this problem.

Bug Fixes and Improvements

This update fixes over 80 bugs that were reported in the last several months. Some of these issues only affect version 13, but could also apply to other supported versions.

Some of these fixes include:

Fix an issue with GiST indexes where concurrent insertions could lead to a corrupt index with entries placed in the wrong pages. You should REINDEX any affected GiST indexes.
Fix CREATE INDEX CONCURRENTLY to ensure rows from concurrent prepared transactions are included in the index. Installations that have enabled prepared transactions should REINDEX any concurrently-built indexes.
Fix for possible incorrect query results when a hash aggregation is spilled to disk.
Fix edge case in incremental sort that could lead to sorting results incorrectly or a "retrieved too many tuples in a bounded sort" error.
Avoid crash when a CALL or DO statement that performs a transaction rollback is executed via extended query protocol, such as from prepared statements.
Fix a failure when a PL/pgSQL procedure used CALL on another procedure that has OUT parameters that executed a COMMIT or ROLLBACK.
Remove errors from BEFORE UPDATE triggers on partitioned tables for restrictions that no longer apply.
Several fixes for queries with joins that could lead to error messages such as "no relation entry for relid N" or "failed to build any N-way joins".
Do not consider parallel-restricted or set-returning functions in an ORDER BY expressions when trying to parallelize sorts.
Fix ALTER DEFAULT PRIVILEGES to handle duplicate arguments safely.
Several fixes in behavior when wal_level is set to minimal, including when tables are rewritten within a transaction.
Several fixes for CREATE TABLE LIKE.
Ensure that allocated disk space for a dropped relation (e.g. a table) is released promptly when a transaction is committed.
Fix progress reporting for CLUSTER.
Fix handling of backslash-escaped multibyte characters in COPY FROM.
Fix recently-introduced race conditions in LISTEN/NOTIFY queue handling.
Allow the jsonb concatenation operator (||) to handle all combinations of JSON data types.
Fix WAL-reading logic so that standbys can handle timeline switches correctly. This issue could have shown itself with errors like "requested WAL segment has already been removed".
Several leak fixes for the walsender process around logical decoding and replication.
Ensure that a nonempty value of krb_server_keyfile always overrides any setting of KRB5_KTNAME in the server environment
Several fixes for GSS encryption support.
Ensure the \connect command allows the use of a password in the connection_string argument.
Fix assorted bugs with the \help command.
Several fixes for pg_dump.
Ensure that pg_rewind accounts for all WAL when rewinding a standby server.
Fix memory leak in contrib/auto_explain.
Ensure all postgres_fdw connections are closed if the a user mapping or foreign server object those connections depend on are dropped.
Fix JIT compilation to be compatible with LLVM 11 and LLVM 12.
This update also contains tzdata release 2021a for DST law changes in Russia (Volgograd zone) and South Sudan, plus historical corrections for Australia, Bahamas, Belize, Bermuda, Ghana, Israel, Kenya, Nigeria, Palestine, Seychelles, and Vanuatu.

Notably, the Australia/Currie zone has been corrected to the point where it is identical to Australia/Hobart.

For the full list of changes available, please review the release notes.

PostgreSQL 9.5 is EOL

This is the final release of PostgreSQL 9.5. If you are running PostgreSQL 9.5 in a production environment, we suggest that you make plans to upgrade to a newer, supported version of PostgreSQL. Please see our versioning policy for more information.

Revision 1.18 / (download) - annotate - [select for diffs], Fri Dec 4 04:55:45 2020 UTC (2 years, 9 months ago) by riastradh
Branch: MAIN
CVS Tags: pkgsrc-2020Q4-base, pkgsrc-2020Q4
Changes since 1.17: +2 -1 lines
Diff to previous 1.17 (colored)

Revbump for openpam cppflags change months ago, belatedly.

Revision 1.17 / (download) - annotate - [select for diffs], Mon Nov 16 12:15:06 2020 UTC (2 years, 10 months ago) by adam
Branch: MAIN
Changes since 1.16: +1 -2 lines
Diff to previous 1.16 (colored)

postgresql: updated to 13.1, 12.5, 11.10, 10.15, 9.6.20, and 9.5.24

PostgreSQL 13.1, 12.5, 11.10, 10.15, 9.6.20, and 9.5.24

Security Issues

* CVE-2020-25695: Multiple features escape "security restricted operation" sandbox
* CVE-2020-25694: Reconnection can downgrade connection security settings
* CVE-2020-25696: psql's \gset allows overwriting specially treated variables

Bug Fixes and Improvements

This update also fixes over 65 bugs that were reported in the last several months. Some of these issues only affect version 13, but may also apply to other supported versions.

Some of these fixes include:

Fix a breakage in the replication protocol by ensuring that two "command completion" events are expected for START_REPLICATION.
Ensure fsync is called on the SLRU caches that PostgreSQL maintains. This prevents potential data loss due to an operating system crash.
Fix ALTER ROLE usage for users with the BYPASSRLS permission.
ALTER TABLE ONLY ... DROP EXPRESSION is disallowed on partitioned tables when there are child tables.
Ensure that ALTER TABLE ONLY ... ENABLE/DISABLE TRIGGER does not apply to child tables.
Fix for ALTER TABLE ... SET NOT NULL on partitioned tables to avoid a potential deadlock in parallel pg_restore.
Fix handling of expressions in CREATE TABLE LIKE with inheritance.
DROP INDEX CONCURRENTLY is disallowed on partitioned tables.
Allow LOCK TABLE to succeed on a self-referential view instead of throwing an error.
Several fixes around statistics collection and progress reporting for REINDEX CONCURRENTLY.
Ensure that GENERATED columns are updated when any columns they depend on are updated via a rule or an updatable view.
Support hash partitioning with text array columns as partition keys.
Allow the jsonpath .datetime() method to accept ISO 8601-format timestamps.
During a "smart" shutdown, ensure background processes are not terminated until all foreground client sessions are completed, fixing an issue that broke the processing of parallel queries.
Several fixes for the query planner and optimizer.
Ensure that data is de-toasted before being inserted into a BRIN index. This could manifest itself with errors like "missing chunk number 0 for toast value NNN". If you have seen a similar error in an existing BRIN index, you should be able to correct it by using REINDEX on the index.
Fix the output of EXPLAIN to have the correct XML tag nesting for incremental sort plans.
Several fixes for memory leaks, including ones involving RLS policies, using CALL with PL/pgSQL, SIGHUP processing a configuration parameter that cannot be applied without a restart, and an edge-case for index lookup for a partition.
libpq can now support arbitrary-length lines in the .pgpass file.
On Windows, psql now reads the output of a backtick command in text mode, not binary mode, so it can now properly handle newlines.
Fix how pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb use complex connection-string parameters.
When the \connect command of psql reuses connection parameters, ensure that all non-overridden parameters from a previous connection string are also re-used.
Ensure that pg_dump collects per-column information about extension configuration tables, avoiding crashes when specifying --inserts.
Ensure that parallel pg_restore processes foreign keys referencing partitioned tables in the correct order.
Several fixes for contrib/pgcrypto, including a memory leak fix.

Revision 1.16 / (download) - annotate - [select for diffs], Thu Nov 5 09:07:47 2020 UTC (2 years, 10 months ago) by ryoon
Branch: MAIN
Changes since 1.15: +2 -2 lines
Diff to previous 1.15 (colored)

*: Recursive revbump from textproc/icu-68.1

Revision 1.15 / (download) - annotate - [select for diffs], Mon Aug 31 18:07:12 2020 UTC (3 years ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2020Q3-base, pkgsrc-2020Q3
Changes since 1.14: +2 -1 lines
Diff to previous 1.14 (colored)

*: bump PKGREVISION for perl-5.32.

Revision 1.14 / (download) - annotate - [select for diffs], Fri Aug 14 06:56:24 2020 UTC (3 years, 1 month ago) by adam
Branch: MAIN
Changes since 1.13: +1 -2 lines
Diff to previous 1.13 (colored)

postgresql: updated to 12.4, 11.9, 10.14, 9.6.19, 9.5.23

PostgreSQL 12.4, 11.9, 10.14, 9.6.19, 9.5.23

Security Issues

CVE-2020-14349: Uncontrolled search path element in logical replication.
Versions Affected: 10 - 12.

The PostgreSQL search_path setting determines schemas searched for tables, functions, operators, etc. The CVE-2018-1058 fix caused most PostgreSQL-provided client applications to sanitize search_path, but logical replication continued to leave search_path unchanged. Users of a replication publisher or subscriber database can create objects in the public schema and harness them to execute arbitrary SQL functions under the identity running replication, often a superuser. Installations having adopted a documented secure schema usage pattern are not vulnerable.

The PostgreSQL project thanks Noah Misch for reporting this problem.

CVE-2020-14350: Uncontrolled search path element in CREATE EXTENSION.
Versions Affected: 9.5 - 12. The security team typically does not test unsupported versions, but this problem is quite old.

When a superuser runs certain CREATE EXTENSION statements, users may be able to execute arbitrary SQL functions under the identity of that superuser. The attacker must have permission to create objects in the new extension's schema or a schema of a prerequisite extension. Not all extensions are vulnerable.

In addition to correcting the extensions provided with PostgreSQL, the PostgreSQL Global Development Group is issuing guidance for third-party extension authors to secure their own work.

Bug Fixes and Improvements

This update also fixes over 50 bugs that were reported in the last several months. Some of these issues affect only version 12, but many affect all supported versions.

Some of these fixes include:

Fix edge cases in partition pruning involving multiple partition key columns with multiple or no constraining WHERE clauses.
Several fixes for query planning and execution involving partitions.
Fix for determining when to execute a column-specific UPDATE trigger on a logical replication subscriber.
pg_replication_slot_advance() now updates the oldest xmin and LSN values, as the failure to do this could prevent resources (e.g. WAL files) from being cleaned up.
Fix a performance regression in ts_headline().
Ensure that pg_read_file() and related functions read until EOF is reached, which fixes compatibility with pipes and other virtual files.
Forbid numeric NaN values in jsonpath computations, which do not exist in SQL nor JSON.
Several fixes for NaN inputs with aggregate functions. This fixes a change in PostgreSQL 12 where NaN values caused the following aggregates to emit values of 0 instead of NaN: corr(), covar_pop(), regr_intercept(), regr_r2(), regr_slope(), regr_sxx(), regr_sxy(), regr_syy(), stddev_pop(), and var_pop().
time and timetz values fractionally greater than 24:00:00 are now rejected.
Several fixes for EXPLAIN, including a fix for reporting resource usage when a plan uses parallel workers with "Gather Merge" nodes.
Fix timing of constraint revalidation in ALTER TABLE that could lead to odd errors.
Fix for REINDEX CONCURRENTLY that could prevent old values from being included in future logical decoding output.
Fix for LATERAL references that could potentially cause crashes during query execution.
Use the collation specified for a query when estimating operator costs
Fix conflict-checking anomalies in SERIALIZABLE transaction isolation mode.
Ensure checkpointer process discards file sync requests when fsync is off
Fix issue where pg_control could be written out with an inconsistent checksum, which could lead to the inability to restart the database if it crashed before the next pg_control update.
Ensure that libpq continues to try to read from the database connection socket after a write failure, as this allows the connection to collect any final error messages from the server.
Report out-of-disk-space errors properly in pg_dump and pg_basebackup
Several fixes for pg_restore, including a fix for parallel restore on tables that have both table-level and column-level privileges.
Fix for pg_upgrade to ensure it runs with vacuum_defer_cleanup_age set to 0.
Fix how pg_rewind handles just-deleted files in the source data directory
Fix failure to initialize local state correctly in contrib/dblink, which could lead to dblink_close() issuing an unexpected COMMIT on the remote server.
Change contrib/amcheck to not report about deleted index pages that are empty, as this is normal during WAL replay.

Revision 1.13 / (download) - annotate - [select for diffs], Tue Jun 2 08:23:29 2020 UTC (3 years, 3 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2020Q2-base, pkgsrc-2020Q2
Changes since 1.12: +2 -1 lines
Diff to previous 1.12 (colored)

Revbump for icu

Revision 1.12 / (download) - annotate - [select for diffs], Wed May 13 04:58:22 2020 UTC (3 years, 4 months ago) by rillig
Branch: MAIN
Changes since 1.11: +2 -1 lines
Diff to previous 1.11 (colored)

databases/postgresql: suppress USE_TOOLS+=perl warning

Revision 1.11 / (download) - annotate - [select for diffs], Fri Feb 14 17:06:44 2020 UTC (3 years, 7 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2020Q1-base, pkgsrc-2020Q1
Changes since 1.10: +2 -3 lines
Diff to previous 1.10 (colored)

postgresqlNN: updated to 12.2, 11.7, 10.12, 9.6.17, 9.5.21, and 9.4.26

PostgreSQL 12.2, 11.7, 10.12, 9.6.17, 9.5.21, and 9.4.26

PostgreSQL 9.4 Now EOL

This is the last release for PostgreSQL 9.4, which will no longer receive security updates and bug fixes. PostgreSQL 9.4 introduced new features such as JSONB support, the ALTER SYSTEM command, the ability to stream logical changes to an output plugin, and more.

While we are very proud of this release, these features are also found in newer versions of PostgreSQL. Many of these features have also received improvements, and, per our versioning policy, it is time to retire PostgreSQL 9.4.

To receive continued support, we suggest that you make plans to upgrade to a newer, supported version of PostgreSQL. Please see the PostgreSQL versioning policy for more information.


Security Issues

CVE-2020-1720: ALTER ... DEPENDS ON EXTENSION is missing authorization checks.
Versions Affected: 9.6 - 12

The ALTER ... DEPENDS ON EXTENSION sub-commands do not perform authorization checks, which can allow an unprivileged user to drop any function, procedure, materialized view, index, or trigger under certain conditions. This attack is possible if an administrator has installed an extension and an unprivileged user can CREATE, or an extension owner either executes DROP EXTENSION predictably or can be convinced to execute DROP EXTENSION.


Bug Fixes and Improvements

This update also fixes over 75 bugs that were reported in the last several months. Some of these issues affect only version 12, but may also affect all supported versions.

Some of these fixes include:

Fix for partitioned tables with foreign-key references where TRUNCATE ... CASCADE would not remove all data. If you have previously used TRUNCATE ... CASCADE on a partitioned table with foreign-key references please see the "Updating" section for verification and cleanup steps.
Fix failure to add foreign key constraints to table with sub-partitions (aka a multi-level partitioned table). If you have previously used this functionality, you can fix it by either detaching and re-attaching the affected partition, or by dropping and re-adding the foreign key constraint to the parent table. You can find more information on how to perform these steps in the ALTER TABLE documentation.
Fix performance issue for partitioned tables introduced by the fix for CVE-2017-7484 that now allows the planner to use statistics on a child table for a column that the user is granted access to on the parent table when the query contains a leaky operator.
Several other fixes and changes for partitioned tables, including disallowing partition key expressions that return pseudo-types, such as RECORD.
Fix for logical replication subscribers for executing per-column UPDATE triggers.
Fix for several crashes and failures for logical replication subscribers and publishers.
Improve efficiency of logical replication with REPLICA IDENTITY FULL.
Ensure that calling pg_replication_slot_advance() on a physical replication slot will persist changes across restarts.
Several fixes for the walsender processes.
Improve performance of hash joins with very large inner relations.
Fix placement of "Subplans Removed" field in EXPLAIN output by placing it with its parent Append or MergeAppend plan.
Several fixes for parallel query plans.
Several fixes for query planner errors, including one that affected joins to single-row subqueries.
Several fixes for MCV extend statistics, including one for incorrect estimation for OR clauses.
Improve efficiency of parallel hash join on CPUs with many cores.
Ignore the CONCURRENTLY option when performing an index creation, drop, or reindex on a temporary table.
Fall back to non-parallel index builds when a parallelized CREATE INDEX has no free dynamic shared memory slots.
Several fixes for GiST & GIN indexes.
Fix possible crash in BRIN index operations with box, range and inet data types.
Fix support for BRIN hypothetical indexes.
Fix failure in ALTER TABLE when a column referenced in a GENERATED expression is added or changed in type earlier in the same ALTER TABLE statement.
Fix handling of multiple AFTER ROW triggers on a foreign table.
Fix off-by-one result for EXTRACT(ISOYEAR FROM timestamp) for BC dates.
Prevent unwanted lowercasing and truncation of RADIUS authentication parameters in the pg_hba.conf file.
Several fixes for GSSAPI support, including having libpq accept all GSS-related connection parameters even if the GSSAPI code is not compiled in.
Several fixes for pg_dump and pg_restore when run in parallel mode.
Fix crash with postgres_fdw when trying to execute a remote query on the remote server such as UPDATE remote_tab SET (x,y) = (SELECT ...).
Disallow NULL category values in the crosstab() function of contrib/tablefunc to prevent crashes.
Several fixes for Windows, including a race condition that could cause timing oddities with NOTIFY.
Several ecpg fixes.

Revision 1.10 / (download) - annotate - [select for diffs], Sat Jan 18 21:48:02 2020 UTC (3 years, 8 months ago) by jperkin
Branch: MAIN
Changes since 1.9: +2 -1 lines
Diff to previous 1.9 (colored)

*: Recursive revision bump for openssl 1.1.1.

Revision 1.9 / (download) - annotate - [select for diffs], Fri Nov 9 18:12:26 2018 UTC (4 years, 10 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2019Q4-base, pkgsrc-2019Q4, pkgsrc-2019Q3-base, pkgsrc-2019Q3, pkgsrc-2019Q2-base, pkgsrc-2019Q2, pkgsrc-2019Q1-base, pkgsrc-2019Q1, pkgsrc-2018Q4-base, pkgsrc-2018Q4
Changes since 1.8: +1 -2 lines
Diff to previous 1.8 (colored)

postgresNN: updated to the latest

The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 11.1, 10.6, 9.6.11, 9.5.15, 9.4.20, and 9.3.25. This release fixes one security issue as well as bugs reported over the last three months.

All users using the affected versions of PostgreSQL should update as soon as possible. Please see the notes on "Updating" below for any post-update steps that may be required if you are using pg_stat_statements in your installation.

This update is also the final release for PostgreSQL 9.3, which is now end-of-life and will no longer receive any bug or security fixes. If your environment still uses PostgreSQL 9.3, please make plans to update to a community supported version as soon as possible. Please see our versioning policy for more information.

Security Issues

One security vulnerability has been closed by this release:

CVE-2018-16850: SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.
Versions Affected: 10, 11

Using a purpose-crafted trigger definition, an attacker can run arbitrary SQL statements with superuser privileges when a superuser runs pg_upgrade on the database or during a pg_dump dump/restore cycle. This attack requires a CREATE privilege on some non-temporary schema or a TRIGGER privilege on a table. This is exploitable in the default PostgreSQL configuration, where all users have CREATE privilege on public schema.

Bug Fixes and Improvements

This update also fixes numerous bugs that were reported in the last several months. Some of these issues affect only version 11, but many affect all supported versions.

These releases include fixes that:

Ensure that automatically created child indexes are created in the same tablespace as the parent partitioned index
Fix several crashes with triggers
Fix problems with applying ON COMMIT DELETE ROWS to a partitioned temporary table
Fix how NULL values are handled when using LEFT JOIN with a parallelized hash join
Several fixes around using named or defaulted arguments in CALL statements
Fix for strict aggregate functions (i.e. aggregates that cannot accept NULL inputs) with ORDER BY columns that enforces the strictness check
Fix with CASE statements where an expression was cast to an array type
Disable an optimization for updating expression indexes in order to prevent a crash
Fix a memory leak that occurred on a specific case of using a SP-GiST index
Fix for pg_verify_checksums incorrectly reporting on files that are not expected to have checksums
Prevent the PostgreSQL server from starting when wal_level is set to a value that cannot support an existing replication slot
Ensure that the server will process already-received NOTIFY and SIGTERM interrupts before waiting for client input
Allow PL/Ruby to work with newer versions of PostgreSQL
Fix for character-class checks on Windows for Unicode characters above U+FFFF, which affected full-text search as well as contrib/ltree and contrib/pg_trgm
Fix a case where psql would not report the receipt of a message from a NOTIFY call until after the next command
Fix build problems on macOS 10.14 (Mojave)
Several build fixes for the Windows platform
This updates also contains tzdata release 2018g for DST law changes in Chile, Fiji, Morocco, and Russia (Volgograd), plus historical corrections for China, Hawaii, Japan, Macau, and North Korea.

Revision 1.8 / (download) - annotate - [select for diffs], Wed Aug 22 09:43:25 2018 UTC (5 years, 1 month ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2018Q3-base, pkgsrc-2018Q3
Changes since 1.7: +2 -1 lines
Diff to previous 1.7 (colored)

Recursive bump for perl5-5.28.0

Revision 1.7 / (download) - annotate - [select for diffs], Mon Nov 13 09:33:32 2017 UTC (5 years, 10 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2018Q2-base, pkgsrc-2018Q2, pkgsrc-2018Q1-base, pkgsrc-2018Q1, pkgsrc-2017Q4-base, pkgsrc-2017Q4
Changes since 1.6: +1 -2 lines
Diff to previous 1.6 (colored)

postgresql: updated to the latest

The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, and 9.2.24. This release fixes three security issues. This release also fixes issues found in BRIN indexing, logical replication and other bugs reported over the past three months.

All users using the affected versions of PostgreSQL should update as soon as possible. If you use BRIN indexes or contrib/start-scripts, please see the release notes for additional post-upgrade steps.

Security Issues

Three security vulnerabilities have been fixed by this release:

CVE-2017-12172: Start scripts permit database administrator to modify root-owned files
CVE-2017-15098: Memory disclosure in JSON functions
CVE-2017-15099: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges


Bug Fixes and Improvements

This update also fixes a number of bugs reported in the last few months. Some of these issues affect only version 10, but many affect all supported versions:

Fix a race condition in BRIN indexing that could cause some rows to not be included in the indexing.
Fix crash when logical decoding is invoked from a PL language function.
Several fixes for logical replication.
Restored behavior for CTEs attached to INSERT/UPDATE/DELETE statements to pre-version 10.
Prevent low-probability crash in processing of nested trigger firings.
Do not evaluate an aggregate function's argument expressions when the conditions in the FILTER clause evaluate to FALSE. This complies with SQL-standard behavior.
Fix incorrect query results when multiple GROUPING SETS columns contain the same simple variable.
Fix memory leak over the lifespan of a query when evaluating a set-returning function from the target list in a SELECT.
Several fixes for parallel query execution, including fixing a crash in the parallel execution of certain queries that contain a certain type of bitmap scan.
Fix json_build_array(), json_build_object(), jsonb_build_array(), and jsonb_build_object() to handle explicit VARIADIC arguments correctly.
Prevent infinite float values from being casted to the numeric type.
Fix autovacuum's ork itemlogic to prevent possible crashes and silent loss of work items.
Several fixes for VIEWs around adding columns to the end of a view.
Fix for hashability detection of range data types that are created by a user.
Improvements on using extended statistics on columns for the purposes of query planning.
Prevent idle_in_transaction_session_timeout from being ignored when a statement_timeout occurred earlier.
Fix low-probability loss of NOTIFY messages due more than 2 billion transactions processing before any queries are executed in the session.
Several file system interaction fixes.
Correctly restore the umask setting when file creation fails in COPY or lo_export().
Fix pg_dump to ensure that it emits GRANT commands in a valid order.
Fix pg_basebackup's matching of tablespace paths to canonicalize both paths before comparing to help improve Windows compatibility.
Fix libpq to not require user's home directory to exist when trying to read the "~/.pgpass" file.
Several fixes for ecpg.

Revision 1.6 / (download) - annotate - [select for diffs], Fri Nov 10 14:47:42 2017 UTC (5 years, 10 months ago) by fhajny
Branch: MAIN
Changes since 1.5: +2 -1 lines
Diff to previous 1.5 (colored)

Make sure the --as-needed linker arg does not leak into the pgxs Makefiles
on Darwin and SunOS where it's not supported. Bump PKGREVISION on *-client.

Revision 1.4.2.1 / (download) - annotate - [select for diffs], Wed Sep 13 06:23:55 2017 UTC (6 years ago) by spz
Branch: pkgsrc-2017Q2
Changes since 1.4: +1 -2 lines
Diff to previous 1.4 (colored) next main 1.5 (colored)

Pullup ticket #5540 - requested by taca
databases/postgresql95: security update
databases/postgresql95-client: security update
databases/postgresql95-docs: security update
databases/postgresql95-server: security update

Revisions pulled up:
- databases/postgresql95-client/Makefile                        1.5
- databases/postgresql95-docs/PLIST                             1.8
- databases/postgresql95/Makefile.common                        1.10
- databases/postgresql95/distinfo                               1.9
- databases/postgresql95/patches/patch-src_pl_plperl_plperl.h   1.2

-------------------------------------------------------------------
   Module Name:	pkgsrc
   Committed By:	adam
   Date:		Sun Aug 13 19:25:18 UTC 2017

   Modified Files:
   	pkgsrc/databases/postgresql92: Makefile.common distinfo
   	pkgsrc/databases/postgresql92-docs: PLIST
   	pkgsrc/databases/postgresql92/patches: patch-src_pl_plperl_plperl.h
   	pkgsrc/databases/postgresql93: Makefile.common distinfo
   	pkgsrc/databases/postgresql93-docs: PLIST
   	pkgsrc/databases/postgresql93/patches: patch-src_pl_plperl_plperl.h
   	pkgsrc/databases/postgresql94: Makefile.common distinfo
   	pkgsrc/databases/postgresql94-docs: PLIST
   	pkgsrc/databases/postgresql94/patches: patch-src_pl_plperl_plperl.h
   	pkgsrc/databases/postgresql95: Makefile.common distinfo
   	pkgsrc/databases/postgresql95-client: Makefile
   	pkgsrc/databases/postgresql95-docs: PLIST
   	pkgsrc/databases/postgresql95/patches: patch-src_pl_plperl_plperl.h
   	pkgsrc/databases/postgresql96: Makefile.common distinfo
   	pkgsrc/databases/postgresql96-client: Makefile PLIST
   	pkgsrc/databases/postgresql96-docs: PLIST
   	pkgsrc/databases/postgresql96/patches: patch-src_pl_plperl_plperl.h

   Log Message:
   The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22. This release fixes three security issues. It also patches over 50 other bugs reported over the last three months. Users who are affected by the below security issues should update as soon as possible. Users affected by CVE-2017-7547 will need to perform additional steps after upgrading to resolve the issue. Other users should plan to update at the next convenient downtime.

   Three security vulnerabilities have been closed by this release:
   * CVE-2017-7546: Empty password accepted in some authentication methods
   * CVE-2017-7547: The "pg_user_mappings" catalog view discloses passwords to users lacking server privileges
   * CVE-2017-7548: lo_put() function ignores ACLs


   To generate a diff of this commit:
   cvs rdiff -u -r1.9 -r1.10 pkgsrc/databases/postgresql95/Makefile.common
   cvs rdiff -u -r1.8 -r1.9 pkgsrc/databases/postgresql95/distinfo
   cvs rdiff -u -r1.4 -r1.5 pkgsrc/databases/postgresql95-client/Makefile
   cvs rdiff -u -r1.7 -r1.8 pkgsrc/databases/postgresql95-docs/PLIST
   cvs rdiff -u -r1.1 -r1.2 \
       pkgsrc/databases/postgresql95/patches/patch-src_pl_plperl_plperl.h

Revision 1.5 / (download) - annotate - [select for diffs], Sun Aug 13 19:25:18 2017 UTC (6 years, 1 month ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2017Q3-base, pkgsrc-2017Q3
Changes since 1.4: +1 -2 lines
Diff to previous 1.4 (colored)

The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.4, 9.5.8, 9.4.13, 9.3.18, and 9.2.22. This release fixes three security issues. It also patches over 50 other bugs reported over the last three months. Users who are affected by the below security issues should update as soon as possible. Users affected by CVE-2017-7547 will need to perform additional steps after upgrading to resolve the issue. Other users should plan to update at the next convenient downtime.

Three security vulnerabilities have been closed by this release:
* CVE-2017-7546: Empty password accepted in some authentication methods
* CVE-2017-7547: The "pg_user_mappings" catalog view discloses passwords to users lacking server privileges
* CVE-2017-7548: lo_put() function ignores ACLs

Revision 1.4 / (download) - annotate - [select for diffs], Mon Jun 5 12:30:56 2017 UTC (6 years, 3 months ago) by fhajny
Branch: MAIN
CVS Tags: pkgsrc-2017Q2-base
Branch point for: pkgsrc-2017Q2
Changes since 1.3: +6 -1 lines
Diff to previous 1.3 (colored)

Extend last year fix to PostgreSQL 9.5 and 9.6.

Override INSTALL script to make sure owner/group args do not leak
into the binary packages. Fixes problems with building software
manually against binary postgresql*-client packages built under an
unprivileged setup. Bump respective PKGREVISION.

Revision 1.2.2.1 / (download) - annotate - [select for diffs], Wed Apr 27 20:12:35 2016 UTC (7 years, 5 months ago) by bsiegert
Branch: pkgsrc-2016Q1
Changes since 1.2: +1 -2 lines
Diff to previous 1.2 (colored) next main 1.3 (colored)

Pullup ticket #4964 - requested by sevan
databases/postgresql95: security fix

Revisions pulled up:
- databases/postgresql95-adminpack/Makefile                     1.3
- databases/postgresql95-client/Makefile                        1.3
- databases/postgresql95-client/PLIST                           1.2
- databases/postgresql95-datatypes/Makefile                     1.3
- databases/postgresql95-dblink/Makefile                        1.3
- databases/postgresql95-docs/PLIST                             1.2
- databases/postgresql95-fuzzystrmatch/Makefile                 1.3
- databases/postgresql95-monitoring/Makefile                    1.3
- databases/postgresql95-pgcrypto/Makefile                      1.3
- databases/postgresql95-plperl/Makefile                        1.3
- databases/postgresql95-plpython/Makefile                      1.3
- databases/postgresql95-pltcl/Makefile                         1.3
- databases/postgresql95-replicationtools/Makefile              1.3
- databases/postgresql95-server/Makefile                        1.4
- databases/postgresql95-server/PLIST                           1.2
- databases/postgresql95/Makefile                               1.3
- databases/postgresql95/Makefile.common                        1.2
- databases/postgresql95/distinfo                               1.2

---
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Sat Apr  9 12:51:50 UTC 2016

   Modified Files:
           pkgsrc/databases/postgresql91: Makefile Makefile.common distinfo
           pkgsrc/databases/postgresql91-adminpack: Makefile
           pkgsrc/databases/postgresql91-client: Makefile
           pkgsrc/databases/postgresql91-datatypes: Makefile
           pkgsrc/databases/postgresql91-dblink: Makefile
           pkgsrc/databases/postgresql91-docs: PLIST
           pkgsrc/databases/postgresql91-fuzzystrmatch: Makefile
           pkgsrc/databases/postgresql91-monitoring: Makefile
           pkgsrc/databases/postgresql91-pgcrypto: Makefile
           pkgsrc/databases/postgresql91-plperl: Makefile
           pkgsrc/databases/postgresql91-plpython: Makefile
           pkgsrc/databases/postgresql91-pltcl: Makefile
           pkgsrc/databases/postgresql91-replicationtools: Makefile
           pkgsrc/databases/postgresql91-server: Makefile PLIST
           pkgsrc/databases/postgresql91-upgrade: Makefile
           pkgsrc/databases/postgresql92: Makefile Makefile.common distinfo
           pkgsrc/databases/postgresql92-adminpack: Makefile
           pkgsrc/databases/postgresql92-client: Makefile
           pkgsrc/databases/postgresql92-datatypes: Makefile
           pkgsrc/databases/postgresql92-dblink: Makefile
           pkgsrc/databases/postgresql92-docs: PLIST
           pkgsrc/databases/postgresql92-fuzzystrmatch: Makefile
           pkgsrc/databases/postgresql92-monitoring: Makefile
           pkgsrc/databases/postgresql92-pgcrypto: Makefile
           pkgsrc/databases/postgresql92-plperl: Makefile
           pkgsrc/databases/postgresql92-plpython: Makefile
           pkgsrc/databases/postgresql92-pltcl: Makefile
           pkgsrc/databases/postgresql92-replicationtools: Makefile
           pkgsrc/databases/postgresql92-server: Makefile PLIST
           pkgsrc/databases/postgresql92-upgrade: Makefile
           pkgsrc/databases/postgresql93: Makefile Makefile.common distinfo
           pkgsrc/databases/postgresql93-adminpack: Makefile
           pkgsrc/databases/postgresql93-client: Makefile
           pkgsrc/databases/postgresql93-datatypes: Makefile
           pkgsrc/databases/postgresql93-dblink: Makefile
           pkgsrc/databases/postgresql93-docs: PLIST
           pkgsrc/databases/postgresql93-fuzzystrmatch: Makefile
           pkgsrc/databases/postgresql93-monitoring: Makefile
           pkgsrc/databases/postgresql93-pgcrypto: Makefile
           pkgsrc/databases/postgresql93-plperl: Makefile
           pkgsrc/databases/postgresql93-plpython: Makefile
           pkgsrc/databases/postgresql93-pltcl: Makefile
           pkgsrc/databases/postgresql93-replicationtools: Makefile
           pkgsrc/databases/postgresql93-server: Makefile PLIST
           pkgsrc/databases/postgresql93-upgrade: Makefile
           pkgsrc/databases/postgresql94: Makefile Makefile.common distinfo
           pkgsrc/databases/postgresql94-adminpack: Makefile
           pkgsrc/databases/postgresql94-client: Makefile
           pkgsrc/databases/postgresql94-datatypes: Makefile
           pkgsrc/databases/postgresql94-dblink: Makefile
           pkgsrc/databases/postgresql94-docs: PLIST
           pkgsrc/databases/postgresql94-fuzzystrmatch: Makefile
           pkgsrc/databases/postgresql94-monitoring: Makefile
           pkgsrc/databases/postgresql94-pgcrypto: Makefile
           pkgsrc/databases/postgresql94-plperl: Makefile
           pkgsrc/databases/postgresql94-plpython: Makefile
           pkgsrc/databases/postgresql94-pltcl: Makefile
           pkgsrc/databases/postgresql94-replicationtools: Makefile
           pkgsrc/databases/postgresql94-server: Makefile PLIST
           pkgsrc/databases/postgresql94-upgrade: Makefile
           pkgsrc/databases/postgresql95: Makefile Makefile.common distinfo
           pkgsrc/databases/postgresql95-adminpack: Makefile
           pkgsrc/databases/postgresql95-client: Makefile PLIST
           pkgsrc/databases/postgresql95-datatypes: Makefile
           pkgsrc/databases/postgresql95-dblink: Makefile
           pkgsrc/databases/postgresql95-docs: PLIST
           pkgsrc/databases/postgresql95-fuzzystrmatch: Makefile
           pkgsrc/databases/postgresql95-monitoring: Makefile
           pkgsrc/databases/postgresql95-pgcrypto: Makefile
           pkgsrc/databases/postgresql95-plperl: Makefile
           pkgsrc/databases/postgresql95-plpython: Makefile
           pkgsrc/databases/postgresql95-pltcl: Makefile
           pkgsrc/databases/postgresql95-replicationtools: Makefile
           pkgsrc/databases/postgresql95-server: Makefile PLIST

   Log Message:
   The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.5.2, 9.4.7, 9.3.12, 9.2.16, and 9.1.21. This release fixes two security
   issues and one index corruption issue in version 9.5. It also contains a variety of bug fixes for earlier versions. Users of PostgreSQL 9.5.0 or 9.5.1 should update as soon as possible.

   This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to
   be used for the query.

   The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is
   being treated as a security issue.

Revision 1.3 / (download) - annotate - [select for diffs], Sat Apr 9 12:51:49 2016 UTC (7 years, 5 months ago) by adam
Branch: MAIN
CVS Tags: pkgsrc-2017Q1-base, pkgsrc-2017Q1, pkgsrc-2016Q4-base, pkgsrc-2016Q4, pkgsrc-2016Q3-base, pkgsrc-2016Q3, pkgsrc-2016Q2-base, pkgsrc-2016Q2
Changes since 1.2: +1 -2 lines
Diff to previous 1.2 (colored)

The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.5.2, 9.4.7, 9.3.12, 9.2.16, and 9.1.21. This release fixes two security issues and one index corruption issue in version 9.5. It also contains a variety of bug fixes for earlier versions. Users of PostgreSQL 9.5.0 or 9.5.1 should update as soon as possible.

This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query.

The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue.

Revision 1.2 / (download) - annotate - [select for diffs], Sat Mar 5 11:27:44 2016 UTC (7 years, 6 months ago) by jperkin
Branch: MAIN
CVS Tags: pkgsrc-2016Q1-base
Branch point for: pkgsrc-2016Q1
Changes since 1.1: +2 -1 lines
Diff to previous 1.1 (colored)

Bump PKGREVISION for security/openssl ABI bump.

Revision 1.1 / (download) - annotate - [select for diffs], Thu Feb 25 21:37:36 2016 UTC (7 years, 7 months ago) by tnn
Branch: MAIN

Add postgresql95 packages, converted from corresponding postgresql94
packages. postgresql95-upgrade is gone, the pg_upgrade tool is shipped
with postgresql95-client now.

Major enhancements in PostgreSQL 9.5 include:

  Allow INSERTs that would generate constraint conflicts to be turned into
    UPDATEs or ignored
  Add GROUP BY analysis features GROUPING SETS, CUBE and ROLLUP
  Add row-level security control
  Create mechanisms for tracking the progress of replication, including
    methods for identifying the origin of individual changes during logical
    replication
  Add Block Range Indexes (BRIN)
  Substantial performance improvements for sorting
  Substantial performance improvements for multi-CPU machines

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.




CVSweb <webmaster@jp.NetBSD.org>