summaryrefslogtreecommitdiff
path: root/databases/postgresql93-server/files (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove expired ports:Rene Ladan2019-01-0917-865/+0
| | | | | | | | | | | 2019-01-08 databases/postgresql93-client: PostgreSQL-9.3 has reached end-of-life 2019-01-08 databases/postgresql93-docs: PostgreSQL-9.3 has reached end-of-life 2019-01-08 databases/postgresql93-contrib: PostgreSQL-9.3 has reached end-of-life 2019-01-08 databases/postgresql93-pltcl: PostgreSQL-9.3 has reached end-of-life databases/postgresql93-pgtcl: part of expired PostgreSQL 9.3 2019-01-08 databases/postgresql93-plperl: PostgreSQL-9.3 has reached end-of-life 2019-01-08 databases/postgresql93-plpython: PostgreSQL-9.3 has reached end-of-life 2019-01-08 databases/postgresql93-server: PostgreSQL-9.3 has reached end-of-life
* Update to latest versions of PostgreSQLPalle Girgensohn2018-02-082-2/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2018-02-08 Security Update Release ================================== The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21. This release fixes two security issues. This release also fixes issues with VACUUM, GIN indexes, and hash indexes that could lead to data corruption, as well as fixes for using parallel queries and logical replication. All users using the affected versions of PostgreSQL should update as soon as possible. Please see the notes on "Updating" below for any post-update steps that may be required. Please note that PostgreSQL changed its versioning scheme with the release of version 10.0, so updating to version 10.2 from 10.0 or 10.1 is considered a minor update. Security Issues --------------- Two security vulnerabilities have been fixed by this release: * CVE-2018-1052: Fix the processing of partition keys containing multiple expressions * CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are non-world-readable Local fixes to the FreeBSD ports -------------------------------- Inform users about data checksums [1]. Make sure /usr/bin/su is used regardless of PATH settings [2]. Enable DTRACE by default [3]. PR: 214671 [1], 223157 [2], 215028 [3] Security: c602c791-0cf4-11e8-a2ec-6cc21735f730
* Recommand psycopg2 over PyGreSQLBaptiste Daroussin2017-10-151-1/+1
| | | | Submitted by: Christoph Moench-Tegeder <cmt@burggraben.net>
* PostgreSQL security updatesPalle Girgensohn2017-05-111-1/+1
| | | | | | | | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.3, 9.5.7, 9.4.12, 9.3.17, and 9.2.21. This release fixes three security issues. It also patches a number of other bugs reported over the last three months. Users who use the PGREQUIRESSL environment variable to control connections, and users who rely on security isolation between database users when using foreign servers, should update as soon as possible. Other users should plan to update at the next convenient downtime. URL: https://www.postgresql.org/about/news/1746/ Security: CVE-2017-7484, CVE-2017-7485, CVE-2017-7486 Also modify rcorder and let sshd start before PostgreSQL, so any problems during startup can be reviewed promplty from an ssh login.
* Update PostgreSQL to latest versions.Palle Girgensohn2016-10-272-5/+5
| | | | | | | | | | | The PostgreSQL Global Development Group has released an update to all supported versions of our database system, including 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19, and 9.1.24. This release fixes two issues that can cause data corruption, which are described in more detail below. It also patches a number of other bugs reported over the last three months. The project urges users to apply this update at the next possible downtime.
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2016-08-111-1/+1
| | | | | | | | | | | | | | | versions of our database system, including 9.5.4, 9.4.9, 9.3.14, 9.2.18 and 9.1.23. This release fixes two security issues. It also patches a number of other bugs reported over the last three months. Users who rely on security isolation between database users should update as soon as possible. Other users should plan to update at the next convenient downtime. If you are using the ICU patch, please consult UPDATING. Improve periodic cleanup, suggested by claudius (at) ambtec.de. [1] PR: 210941 [1] Security: CVE-2016-5423, CVE-2016-5424
* Rename all files containing a : in their filename.Mathieu Arnold2016-06-171-0/+0
| | | | | | | While there, run make makepatch on affected ports, and rename patches accordingly. Sponsored by: Absolight
* - Fix trailing whitespace in pkg-messagesDmitry Marakasov2016-05-191-1/+1
| | | | Approved by: portmgr blanket
* Update PostgreSQL to latest versions.Palle Girgensohn2016-02-131-10/+11
| | | | | | | | | | | | | | | | | Security Fixes for Regular Expressions, PL/Java This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input. The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser URL: http://www.postgresql.org/about/news/1644/ Security: CVE-2016-0773, CVE-2016-0766
* - Unbreak builds after the lang/python27 update (r363790)Marcus von Appen2014-08-021-11/+0
| | | | Exp-run: 192242, 192244
* Update to the latest snapshots.Chris Rees2014-07-301-106/+95
| | | | | | | | uuid-ossp patch has been outdated with irrelevant changes (for us), so massage back in. In head of postgresql, this is handled properly, so eventually the ossp patches can go.
* Fix mistake with ossp-uuid: don't use --with-ossp-uuid, since it will needPalle Girgensohn2014-03-211-0/+10
| | | | the ossp library present, and then we never use it.
* The PostgreSQL Global Development Group has released an update to all supportedPalle Girgensohn2014-03-201-0/+399
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | version of the database system, including versions 9.3.4, 9.2.8, 9.1.13, 9.0.17, and 8.4.21. This minor release fixes a data corruption issue with replication and crash recovery in version 9.3, as well as several other minor issues in all versions. All users of version 9.3 are urged to update their installations at the next possible downtime. Users of older versions should update at their convenience. The data corruption issue in PostgreSQL 9.3 affects binary replication standbys, servers being recovered from point-in-time-recovery backup, and standalone servers which recover from a system crash. The bug causes unrecoverable index corruption during recovery due to incorrect replay of row locking operations. This can then cause query results to be inconsistent depending on whether or not an index is used, and eventually lead to primary key violations and similar issues. For this reason, users are encouraged to replace each of their standby databases with a new base backup after applying the update. See release notes for more changes. URL: http://www.postgresql.org/docs/current/static/release.html URL: https://wiki.postgresql.org/wiki/20140320UpdateIssues A change specific to the FreeBSD port: Modify the contrib/uuid-ossp to actually work (not crashing the backend) by using the libc implementation of uuid instead of the ossp port. Schemas and queries will just work. Based on the work of Andrew Gierth. 9.1+ EXTENSION support added by girgen@. URL: http://pgfoundry.org/projects/uuid-freebsd PR: ports/121745, ports/182846
* The PostgreSQL Global Development Group has released an importantPalle Girgensohn2014-02-201-6/+6
| | | | | | | | | | | | | | | | | | | | | | update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and 8.4.20. This update contains fixes for multiple security issues, as well as several fixes for replication and data integrity issues. All users are urged to update their installations at the earliest opportunity, especially those using binary replication or running a high-security application. This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page. Security: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063 CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067
* Update to postgreSQL 9.3.0Palle Girgensohn2013-09-091-13/+0
| | | | | | | | | | | | | | | | Major enhancements in PostgreSQL 9.3 include: - Add materialized views - Make simple views auto-updatable - Add many features for the JSON data type, including operators and functions to extract elements from JSON values - Implement SQL-standard LATERAL option for FROM-clause subqueries and function calls - Allow foreign data wrappers to support writes (inserts/updates/deletes) on foreign tables - Add a Postgres foreign data wrapper to allow access to other Postgres servers - Add support for event triggers - Add optional ability to checksum data pages and report corruption - Prevent non-key-field row updates from blocking foreign key checks - Greatly reduce System V shared memory requirements URL: http://www.postgresql.org/docs/9.3/static/release-9-3.html
* pkgconfig belongs under libdataPalle Girgensohn2013-05-121-0/+11
|
* Add postgresql 9.3 beta1Palle Girgensohn2013-05-121-7/+7
|
* Prepare for postgresql 9.3 beta 1 by svn cp postgresql92-* postgresql93-*Palle Girgensohn2013-05-1116-0/+470