summaryrefslogtreecommitdiff
path: root/databases/postgresql81
diff options
context:
space:
mode:
authorjoerg <joerg>2006-05-26 17:47:58 +0000
committerjoerg <joerg>2006-05-26 17:47:58 +0000
commit6bb76a9af6b5f2f9f518e914578f774f510378de (patch)
tree8a97b807d5a353adb40ccd30da343f31be09c326 /databases/postgresql81
parent297c1d9d76b3d72b05ce22473fcae754665704d7 (diff)
downloadpkgsrc-6bb76a9af6b5f2f9f518e914578f774f510378de.tar.gz
Update PostgreSQL to 7.3.15, 7.4.13, 8.0.8 and 8.1.4 respectively.
Common to all versions: * Change the server to reject invalidly-encoded multibyte characters in all cases (Tatsuo, Tom) While PostgreSQL has been moving in this direction for some time, the checks are now applied uniformly to all encodings and all textual input, and are now always errors not merely warnings. This change defends against SQL-injection attacks of the type described in CVE-2006-2313. * Reject unsafe uses of \' in string literals As a server-side defense against SQL-injection attacks of the type described in CVE-2006-2314, the server now only accepts '' and not \' as a representation of ASCII single quote in SQL string literals. By default, \' is rejected only when client_encoding is set to a client-only encoding (SJIS, BIG5, GBK, GB18030, or UHC), which is the scenario in which SQL injection is possible. A new configuration parameter backslash_quote is available to adjust this behavior when needed. Note that full security against CVE-2006-2314 may require client-side changes; the purpose of backslash_quote is in part to make it obvious that insecure clients are insecure. * Modify libpq's string-escaping routines to be aware of encoding considerations This fixes libpq-using applications for the security issues described in CVE-2006-2313 and CVE-2006-2314. Applications that use multiple PostgreSQL connections concurrently should migrate to PQescapeStringConn() and PQescapeByteaConn() to ensure that escaping is done correctly for the settings in use in each database connection. Applications that do string escaping "by hand" should be modified to rely on library routines instead. * Fix some incorrect encoding conversion functions win1251_to_iso, alt_to_iso, euc_tw_to_big5, euc_tw_to_mic, mic_to_euc_tw were all broken to varying extents. * Clean up stray remaining uses of \' in strings (Bruce, Jan) * Fix server to use custom DH SSL parameters correctly (Michael Fuhr) * Fix various minor memory leaks Additionally for 7.4.13 and later: * Fix bug that sometimes caused OR'd index scans to miss rows they should have returned * Fix WAL replay for case where a btree index has been truncated * Fix SIMILAR TO for patterns involving | (Tom) * Fix for Bonjour on Intel Macs (Ashley Clark) Additionally for 8.0.8 and 8.1.4: * Fix SELECT INTO and CREATE TABLE AS to create tables in the default tablespace, not the base directory (Kris Jurka) * Fix problem with password prompting on some Win32 systems (Robert Kinberg) Additionally for 8.1.4: * Fix weak key selection in pgcrypto (Marko Kreen) Errors in fortuna PRNG reseeding logic could cause a predictable session key to be selected by pgp_sym_encrypt() in some cases. This only affects non-OpenSSL-using builds. * Make autovacuum visible in pg_stat_activity (Alvaro) * Disable full_page_writes (Tom) In certain cases, having full_page_writes off would cause crash recovery to fail. A proper fix will appear in 8.2; for now it's just disabled. * Various planner fixes, particularly for bitmap index scans and MIN/MAX optimization (Tom) * Fix incorrect optimization in merge join (Tom) Outer joins could sometimes emit multiple copies of unmatched rows. * Fix crash from using and modifying a plpgsql function in the same transaction * Improve qsort performance (Dann Corbit) Currently this code is only used on Solaris. * Improve pg_dump's handling of default values for domains * Fix pg_dumpall to handle identically-named users and groups reasonably (only possible when dumping from a pre-8.1 server) (Tom) The user and group will be merged into a single role with LOGIN permission. Formerly the merged role wouldn't have LOGIN permission, making it unusable as a user. * Fix pg_restore -n to work as documented (Tom)
Diffstat (limited to 'databases/postgresql81')
-rw-r--r--databases/postgresql81/Makefile.common4
-rw-r--r--databases/postgresql81/distinfo8
2 files changed, 6 insertions, 6 deletions
diff --git a/databases/postgresql81/Makefile.common b/databases/postgresql81/Makefile.common
index 0fc809acb07..848b7c0f73a 100644
--- a/databases/postgresql81/Makefile.common
+++ b/databases/postgresql81/Makefile.common
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile.common,v 1.5 2006/04/13 18:23:30 jlam Exp $
+# $NetBSD: Makefile.common,v 1.6 2006/05/26 17:47:58 joerg Exp $
#
# This Makefile fragment is included by all PostgreSQL packages built from
# the main sources of the PostgreSQL distribution except jdbc-postgresql.
@@ -32,7 +32,7 @@ PATCHDIR?= ${.CURDIR}/../postgresql81/patches
#
# Note: Do not forget jdbc-postgresql81 when updating version
#
-DIST_VERS?= 8.1.3
+DIST_VERS?= 8.1.4
BASE_VERS?= ${DIST_VERS}
BUILDLINK_API_DEPENDS.postgresql81-client+= postgresql81-client>=${BASE_VERS}
diff --git a/databases/postgresql81/distinfo b/databases/postgresql81/distinfo
index a720d62d70e..718d10e565f 100644
--- a/databases/postgresql81/distinfo
+++ b/databases/postgresql81/distinfo
@@ -1,8 +1,8 @@
-$NetBSD: distinfo,v 1.1.1.1 2006/03/20 14:45:49 uebayasi Exp $
+$NetBSD: distinfo,v 1.2 2006/05/26 17:47:58 joerg Exp $
-SHA1 (postgresql-8.1.3.tar.bz2) = eed3f7de11e472fb7bf44865a62c18bc6ca9a3b3
-RMD160 (postgresql-8.1.3.tar.bz2) = b9b1461516e2388de41a7892e05d285fa659d87c
-Size (postgresql-8.1.3.tar.bz2) = 11588289 bytes
+SHA1 (postgresql-8.1.4.tar.bz2) = 1bba120ac841ae835ce2749e1f6959086b4530fd
+RMD160 (postgresql-8.1.4.tar.bz2) = 1bed120cb6aa26b2d8664e383f53974a9b0efda4
+Size (postgresql-8.1.4.tar.bz2) = 11609501 bytes
SHA1 (patch-aa) = a7112ce2e9fc28f638afcf2e196d3cdc0f4c254d
SHA1 (patch-ab) = 8d09f4e274aeb4ac2b15db73e7801376a5627d27
SHA1 (patch-ac) = cbd302a60d43171854c37171b57ee7bbf1194ad9