summaryrefslogtreecommitdiff
path: root/databases/postgresql94-plpython (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove expired ports:Rene Ladan2020-07-241-11/+0
| | | | | | | | | | | 2020-07-24 databases/postgresql94-client: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-contrib: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-docs: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-pgtcl: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-plpython: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-server: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-pltcl: PostgreSQL-9.4 has reached end-of-life 2020-07-24 databases/postgresql94-plperl: PostgreSQL-9.4 has reached end-of-life
* Deprecate PostgreSQL-9.4Palle Girgensohn2020-05-241-0/+4
| | | | | | Final release was in Fabruary 2020. WWW: https://www.postgresql.org/support/versioning/
* Deprecate PostgreSQL-9.4Palle Girgensohn2020-05-241-1/+1
| | | | | | | | Final release was in Fabruary 2020. WWW: https://www.postgresql.org/support/versioning/ Also, fix build problems with plperl and plpython for 9.4
* The PostgreSQL Global Development Group has released an update to allPalle Girgensohn2020-05-171-0/+2
| | | | | | | | | | | | | | | | | supported versions of our database system, including 12.3, 11.8, 10.13, 9.6.18, and 9.5.22. This release fixes one security issue found in the PostgreSQL server and over 75 bugs reported over the last three months. Please plan to update at your earliest convenience. Update the backup warning text. [1] Add plpython and plperl libs for hstore, jsonb and ltree for the versions where they exist. These libs are added to the postgresql??-plpython and -plperl ports, inspired by [2]. PR: 237910 [1], 245246 [2] Submitted by: Francesco [1], Loïc Bartoletti [2]
* iThe PostgreSQL Global Development Group has released an update to allPalle Girgensohn2019-08-081-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | supported versions of our database system, including 11.5, 10.10, 9.6.15, 9.5.19, and 9.4.24, as well as the third beta of PostgreSQL 12. This release fixes two security issues in the PostgreSQL server, two security issues found in one of the PostgreSQL Windows installers, and over 40 bugs reported since the previous release. Users should install these updates as soon as possible. A Note on the PostgreSQL 12 Beta ================================ In the spirit of the open source PostgreSQL community, we strongly encourage you to test the new features of PostgreSQL 12 in your database systems to help us eliminate any bugs or other issues that may exist. While we do not advise you to run PostgreSQL 12 Beta 3 in your production environments, we encourage you to find ways to run your typical application workloads against this beta release. Your testing and feedback will help the community ensure that the PostgreSQL 12 release upholds our standards of providing a stable, reliable release of the world's most advanced open source relational database. Security Issues =============== Two security vulnerabilities have been closed by this release: * CVE-2019-10208: `TYPE` in `pg_temp` executes arbitrary SQL during `SECURITY DEFINER` execution Versions Affected: 9.4 - 11 Given a suitable `SECURITY DEFINER` function, an attacker can execute arbitrary SQL under the identity of the function owner. An attack requires `EXECUTE` permission on the function, which must itself contain a function call having inexact argument type match. For example, `length('foo'::varchar)` and `length('foo')` are inexact, while `length('foo'::text)` is exact. As part of exploiting this vulnerability, the attacker uses `CREATE DOMAIN` to create a type in a `pg_temp` schema. The attack pattern and fix are similar to that for CVE-2007-2138. Writing `SECURITY DEFINER` functions continues to require following the considerations noted in the documentation: https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY The PostgreSQL project thanks Tom Lane for reporting this problem. * CVE-2019-10209: Memory disclosure in cross-type comparison for hashed subplan Versions Affected: 11 In a database containing hypothetical, user-defined hash equality operators, an attacker could read arbitrary bytes of server memory. For an attack to become possible, a superuser would need to create unusual operators. It is possible for operators not purpose-crafted for attack to have the properties that enable an attack, but we are not aware of specific examples. The PostgreSQL project thanks Andreas Seltenreich for reporting this problem.
* Delete the now expired postgresql90 ports. Upstream support forMatthew Seaman2016-07-011-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | postgresql-9.0.x was declared EoL in September 2015. Summary: Remove 9.0 from the list of postgresql versions available in ports Disconnect postgresql90 ports from the build Remove postgresql90-pgtcl port Remove postgresql90-client port Move the master postgreslXY-plperl makefile to postgresql95-plperl/Makefile. Adjust include lines in other postgresqlXY-plperl ports Delete postgresql90-plperl Move the master postgreslXY-plpython/{Makefile,pkg-descr} to postgresl95-plpython/{Makefile,pkg-descr} Adjust all other postgresqlXY-plpython/Makefile to include the new master Remove postgresql90-server Reviewers: jgh, girgen, #portmgr, O5 Ports Framework, bapt, crees Reviewed By: #portmgr, O5 Ports Framework, bapt, crees Subscribers: mat Differential Revision: https://reviews.freebsd.org/D6898
* Update PostgreSQL port to latest version.Palle Girgensohn2015-10-081-1/+0
| | | | | | | | | | | | | | | | | | | | Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt( function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. This update will also disable SSL renegotiation by default; previously, it was enabled by default. SSL renegotiation will be removed entirely in PostgreSQL versions 9.5 and later. URL: http://www.postgresql.org/about/news/1615/ Security: CVE-2015-5288 CVE-2015-5289
* Fixup any version changes I missed yesterday.Chris Rees2014-08-261-1/+1
| | | | Shown logs by: antoine
* Add -docs, -plgtcl, -plperl, -plpython and -pltcl to the flora of ↵Palle Girgensohn2014-05-201-0/+6
postgresql94-ports