summaryrefslogtreecommitdiff
path: root/databases/postgresql15-server
diff options
context:
space:
mode:
authorPalle Girgensohn <girgen@FreeBSD.org>2024-05-09 22:13:22 +0200
committerPalle Girgensohn <girgen@FreeBSD.org>2024-05-10 00:34:46 +0200
commitade1c57e3a72ec9c4a7c02ce28dbfbd5efcce373 (patch)
tree5a1be2c384a6472f3471f0e27acd58b1552f9465 /databases/postgresql15-server
parentsecurity/vuxml: Document vulnerability in postgresql. (diff)
databases/postgresql??-*: Update to latest versions
PostgreSQL 16.3, 15.7, 14.12, 13.15, and 12.19 Released! The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 16.3, 15.7, 14.12, 13.15, and 12.19. This release fixes one security vulnerability and over 55 bugs reported over the last several months. Please note that the fix in this release for CVE-2024-4317 only fixes fresh PostgreSQL installations, namely those that are created with the initdb utility after this fix is applied. If you have a current PostgreSQL installation and are concerned about this issue, please follow the additional updating instructions provided in the CVE-2024-4317 description or the release notes for the remediation. [1] The script is installed as /usr/local/share/postgresql/fix-CVE-2024-4317.sql PostgreSQL 12 will stop receiving fixes on November 14, 2024. If you are running PostgreSQL 12 in a production environment, we suggest that you make plans to upgrade to a newer, supported version of PostgreSQL. Please see our versioning policy for more information. [1]: https://www.postgresql.org/support/security/CVE-2024-4317/ Security: d53c30c1-0d7b-11ef-ba02-6cc21735f730 PR: 277428 (remove unneded patch) PR: 260494 (remove deprecated INTDATE option) PR: 265860 (correct path for contrib README file in pkg-message)
Diffstat (limited to 'databases/postgresql15-server')
-rw-r--r--databases/postgresql15-server/Makefile2
-rw-r--r--databases/postgresql15-server/distinfo6
-rw-r--r--databases/postgresql15-server/files/patch-disable-llvm-jit-inlining-with-tls24
-rw-r--r--databases/postgresql15-server/files/pkg-message-contrib.in2
-rw-r--r--databases/postgresql15-server/files/pkg-message-server.in14
-rw-r--r--databases/postgresql15-server/pkg-plist-server1
6 files changed, 19 insertions, 30 deletions
diff --git a/databases/postgresql15-server/Makefile b/databases/postgresql15-server/Makefile
index 73cdb6c2b2da..ad7d23054e86 100644
--- a/databases/postgresql15-server/Makefile
+++ b/databases/postgresql15-server/Makefile
@@ -1,4 +1,4 @@
-DISTVERSION?= 15.6
+DISTVERSION?= 15.7
# PORTREVISION must be ?= otherwise, all slave ports get this PORTREVISION and
# not their own. Probably best to keep it at ?=0 when reset here too.
PORTREVISION?= 0
diff --git a/databases/postgresql15-server/distinfo b/databases/postgresql15-server/distinfo
index b23b22c9acc4..845cdd374469 100644
--- a/databases/postgresql15-server/distinfo
+++ b/databases/postgresql15-server/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1707301241
-SHA256 (postgresql/postgresql-15.6.tar.bz2) = 8455146ed9c69c93a57de954aead0302cafad035c2b242175d6aa1e17ebcb2fb
-SIZE (postgresql/postgresql-15.6.tar.bz2) = 23093967
+TIMESTAMP = 1715095962
+SHA256 (postgresql/postgresql-15.7.tar.bz2) = a46fe49485ab6385e39dabbbb654f5d3049206f76cd695e224268729520998f7
+SIZE (postgresql/postgresql-15.7.tar.bz2) = 23112318
diff --git a/databases/postgresql15-server/files/patch-disable-llvm-jit-inlining-with-tls b/databases/postgresql15-server/files/patch-disable-llvm-jit-inlining-with-tls
deleted file mode 100644
index 02686061ce99..000000000000
--- a/databases/postgresql15-server/files/patch-disable-llvm-jit-inlining-with-tls
+++ /dev/null
@@ -1,24 +0,0 @@
-Do not inline functions which access TLS in LLVM JIT, as
-this leads to crashes with unsupported relocation error
-
-diff --git src/backend/jit/llvm/llvmjit_inline.cpp src/backend/jit/llvm/llvmjit_inline.cpp
-index 2617a46..a063edb 100644
---- src/backend/jit/llvm/llvmjit_inline.cpp
-+++ src/backend/jit/llvm/llvmjit_inline.cpp
-@@ -608,6 +608,16 @@ function_inlinable(llvm::Function &F,
- if (rv->materialize())
- elog(FATAL, "failed to materialize metadata");
-
-+ /*
-+ * Don't inline functions with thread-local variables until
-+ * related crashes are investigated (see BUG #16696)
-+ */
-+ if (rv->isThreadLocal()) {
-+ ilog(DEBUG1, "cannot inline %s due to thread-local variable %s",
-+ F.getName().data(), rv->getName().data());
-+ return false;
-+ }
-+
- /*
- * Never want to inline externally visible vars, cheap enough to
- * reference.
diff --git a/databases/postgresql15-server/files/pkg-message-contrib.in b/databases/postgresql15-server/files/pkg-message-contrib.in
index 2d9f3d86e71c..006f700a3ae1 100644
--- a/databases/postgresql15-server/files/pkg-message-contrib.in
+++ b/databases/postgresql15-server/files/pkg-message-contrib.in
@@ -2,7 +2,7 @@
{ type: install
message: <<EOM
The PostgreSQL contrib utilities have been installed. Please see
-%%PREFIX%%/share/doc/postgresql/contrib/README
+%%DOCSDIR%%/README-contrib
for more information.
EOM
}
diff --git a/databases/postgresql15-server/files/pkg-message-server.in b/databases/postgresql15-server/files/pkg-message-server.in
index 6370d4a017cc..946ff1d75b6d 100644
--- a/databases/postgresql15-server/files/pkg-message-server.in
+++ b/databases/postgresql15-server/files/pkg-message-server.in
@@ -62,10 +62,22 @@ NB. If you're not using a checksumming filesystem like ZFS, you might
wish to enable data checksumming. It can be enabled during
the initdb phase, by adding the "--data-checksums" flag to
the postgresql_initdb_flags rcvar. Otherwise you can enable it later by
- pg_checksums. Check the initdb(1) manpage for more info
+ using pg_checksums. Check the initdb(1) manpage for more info
and make sure you understand the performance implications.
======================================================================
+
+SECURITY ADVICE
+
+If upgradring from a version 15.x < 15.7:
+A security vulnerability was found in the system views pg_stats_ext
+and pg_stats_ext_exprs, potentially allowing authenticated database
+users to see data they shouldn't. If this is of concern in your
+installation, run the SQL script %%DATADIR%%/fix-CVE-2024-4317.sql
+for each of your databases. For details, see
+https://www.postgresql.org/support/security/CVE-2024-4317/
+
+
EOM
}
]
diff --git a/databases/postgresql15-server/pkg-plist-server b/databases/postgresql15-server/pkg-plist-server
index 4399bd1bd895..cea77992a139 100644
--- a/databases/postgresql15-server/pkg-plist-server
+++ b/databases/postgresql15-server/pkg-plist-server
@@ -786,6 +786,7 @@ lib/postgresql/utf8_and_win.so
%%DATADIR%%/errcodes.txt
%%DATADIR%%/extension/plpgsql--1.0.sql
%%DATADIR%%/extension/plpgsql.control
+%%DATADIR%%/fix-CVE-2024-4317.sql
%%DATADIR%%/information_schema.sql
%%DATADIR%%/pg_hba.conf.sample
%%DATADIR%%/pg_ident.conf.sample