non port: databases/postgresql93-server/pkg-plist-client |
SVNWeb
|
Number of commits found: 13 |
Fri, 10 Aug 2018
|
[ 09:25 girgen ] (Only the first 10 of 20 ports in this commit are shown above. )
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 10.5, 9.6.10, 9.5.14, 9.4.19,
9.3.24. This release fixes two security issues as well as bugs reported over
the last three months.
If you have untrusted users accessing your system and you are either running
PostgreSQL 9.5 or a newer version OR have installed the "dblink" or
"postgres_fdw" extensions, you must apply this update as soon as possible. All
other users can upgrade at the next convenient downtime.
Please note that PostgreSQL changed its versioning scheme with the release of
version 10.0, so updating to version 10.5 from any 10.x release is considered a
minor update.
The PostgreSQL Global Development Group also announces that the third beta (Only the first 15 lines of the commit message are shown above )
|
Thu, 1 Mar 2018
|
[ 15:10 girgen ] (Only the first 10 of 16 ports in this commit are shown above. )
2018-03-01 Security Update Release
The PostgreSQL Global Development Group has released an update to all supported
versions of the PostgreSQL database system, including 10.3, 9.6.8, 9.5.12,
9.4.17, and 9.3.22.
The purpose of this release is to address CVE-2018-1058, which describes how a
user can create like-named objects in different schemas that can change the
behavior of other users' queries and cause unexpected or malicious behavior,
also known as a "trojan-horse" attack. Most of this release centers around added
documentation that describes the issue and how to take steps to mitigate the
impact on PostgreSQL databases.
We strongly encourage all of our users to please visit
https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path
for a detailed explanation of CVE-2018-1058 and how to protect your PostgreSQL
installations.
After evaluating the documentation for CVE-2018-1058, a database administrator
may need to take follow up steps on their PostgreSQL installations to ensure
they are protected from exploitation.
Security: CVE-2018-1058
|
Mon, 17 Jul 2017
|
[ 11:15 amdmi3 ]
- Include pg_regress to all postgresql*-client ports, to allow running
regression tests for postgresql extensions
PR: 217874
Approved by: maintainer timeout (pgsql, 4 months)
|
Sat, 13 Feb 2016
|
[ 22:42 girgen ] (Only the first 10 of 22 ports in this commit are shown above. )
Update PostgreSQL to latest versions.
Security Fixes for Regular Expressions, PL/Java
This release closes security hole CVE-2016-0773, an issue with regular
expression (regex) parsing. Prior code allowed users to pass in expressions
which included out-of-range Unicode characters, triggering a backend crash.
This issue is critical for PostgreSQL systems with untrusted users or which
generate regexes based on user input.
The update also fixes CVE-2016-0766, a privilege escalation issue for users of
PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be
modifiable only by the database superuser
URL: http://www.postgresql.org/about/news/1644/
Security: CVE-2016-0773, CVE-2016-0766
|
Wed, 22 Jul 2015
|
[ 22:45 bapt ] (Only the first 10 of 12 ports in this commit are shown above. )
Simplify a bit the Makefiles
Use OPTIONS_SUB to automatically PLIST_SUB
Use OPTIONS helpers
|
[ 21:46 bapt ] (Only the first 10 of 35 ports in this commit are shown above. )
Cleanup plist and avoid useless @exec
|
Thu, 5 Feb 2015
|
[ 22:54 girgen ] (Only the first 10 of 46 ports in this commit are shown above. )
Update PostgreSQL-9.x to latests versions.
This update fixes multiple security issues reported in PostgreSQL over the past
few months. All of these issues require prior authentication, and some require
additional conditions, and as such are not considered generally urgent.
However, users should examine the list of security holes patched below in case
they are particularly vulnerable.
Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
CVE-2015-0244,CVE-2014-8161
|
Wed, 26 Feb 2014
|
[ 17:24 antoine ] (Only the first 10 of 38 ports in this commit are shown above. )
Stage support
Reviewed by: postgresql@
Tested by: miwi and me
|
Sun, 29 Sep 2013
|
[ 20:19 crees ]
Fix plist
PR: ports/182489
Submitted by: antoine
|
Fri, 28 Jun 2013
|
[ 10:50 girgen ]
Update PostgreSQL 93 to beta 2.
URL: http://www.postgresql.org/about/news/1471/
|
Sun, 12 May 2013
|
[ 22:28 girgen ]
pkgconfig belongs under libdata
|
[ 21:09 girgen ]
Update postgresql93-client to properly depend on pkgconfig
Reported by: Ports-QAT
|
[ 00:00 girgen ] (Only the first 10 of 15 ports in this commit are shown above. )
Add postgresql 9.3 beta1
|
Number of commits found: 13 |