summaryrefslogtreecommitdiff
path: root/databases/postgresql91-server
AgeCommit message (Collapse)AuthorFilesLines
2016-10-29The PostgreSQL Global Development Group has released an update to all ↵adam1-1/+2
supported versions of our database system, including 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19, and 9.1.24. This is also the last update for the PostgreSQL 9.1 series as it is now end-of-life. This release fixes two issues that can cause data corruption, which are described in more detail below. It also patches a number of other bugs reported over the last three months. The project urges users to apply this update at the next possible downtime.
2016-06-08Remove the stability entity, it has no meaning outside of an official context.jperkin1-1/+0
2016-06-08Change the service_bundle name to "export" to reduce diffs between thejperkin1-1/+1
original manifest.xml file and the output from "svccfg export".
2016-06-08Add or fix manpath entries to use the correct path.jperkin1-1/+1
2016-05-23This release fixes a number of issues reported by users over the last two ↵adam1-1/+3
months. Most database administrators should plan to upgrade at the next available downtime, unless they have been affected directly by the fixed issues.
2016-04-09The PostgreSQL Global Development Group has released an update to all ↵adam2-3/+5
supported versions of our database system, including 9.5.2, 9.4.7, 9.3.12, 9.2.16, and 9.1.21. This release fixes two security issues and one index corruption issue in version 9.5. It also contains a variety of bug fixes for earlier versions. Users of PostgreSQL 9.5.0 or 9.5.1 should update as soon as possible. This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query. The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue.
2016-03-15Remove stray SunOS project definition from some SMF manifests.fhajny2-3/+3
These should never have made it in. Bump resp. PKGREVISIONs.
2016-03-05Bump PKGREVISION for security/openssl ABI bump.jperkin1-1/+2
2015-10-11Changes 9.1.19:adam1-1/+2
Two security issues have been fixed in this release which affect users of specific PostgreSQL features: CVE-2015-5289: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. CVE-2015-5288: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed.
2015-02-14Changes 9.1.15:adam1-1/+4
Security Fixes * CVE-2015-0241 Buffer overruns in "to_char" functions. * CVE-2015-0242 Buffer overrun in replacement printf family of functions. * CVE-2015-0243 Memory errors in functions in the pgcrypto extension. * CVE-2015-0244 An error in extended protocol message reading. * CVE-2014-8161 Constraint violation errors can cause display of values in columns which the user would not normally have rights to see. JSON and JSONB Unicode Escapes Other Fixes and Improvements * Cope with the non-ASCII Norwegian Windows locale name. * Avoid data corruption when databases are moved to new tablespaces and back again. * Ensure that UNLOGGED tables are correctly copied during ALTER DATABASE operations. * Avoid deadlocks when locking recently modified rows. * Fix two SELECT FOR UPDATE query issues. * Prevent false negative for shortest-first regular expression matches. * Fix false positives and negatives in tsquery contains operator. * Fix namespace handling in xpath(). * Prevent row-producing functions from creating empty column names. * Make autovacuum use per-table cost_limit and cost_delay settings. * When autovacuum=off, limit autovacuum work to wraparound prevention only. * Multiple fixes for logical decoding in 9.4. * Fix transient errors on hot standby queries due to page replacement. * Prevent duplicate WAL file archiving at end of recovery or standby promotion. * Prevent deadlock in parallel restore of schema-only dump.
2015-01-01If postgres really still doesn't have mips atomics, it should be fixeddholland1-2/+2
(which is easy enough for all but archaic mips) so use BROKEN_ON_PLATFORM.
2014-12-10Set PATH for postgresql SMF, helps 3rd party software invoked viafhajny1-0/+1
modules like PL/Perl.
2014-07-25The PostgreSQL Global Development Group has released an update to all ↵adam1-1/+2
supported version of the database system, including versions 9.3.5, 9.2.9, 9.1.14, 9.0.18, and 8.4.22. This minor release fixes a number of issues discovered and reported by users over the last four months, including some data corruption issues, and is the last update of version 8.4. Users of version 9.3 will want to update at the earliest opportunity; users of version 8.4 will want to schedule an upgrade to a supported PostgreSQL version.
2014-03-12Drop redundant variable setting from postgresql*-server.gdt1-4/+1
PGUSER, PGGROUP, and PGHOME are all in mk/defaults/mk.conf. They are also set (?=) in each server Makefile. Worse, PGHOME is set to varying values. However, the versions in defaults prevail. Therefore, remove the extra/confusing settings, leaving this as a user-settable variable with a default. pkg_info -B before and after shows no related changes, so no PKGREVISION++. Pointed out by Richard Palo, and ok adam@. There's a related issue lurking, which is that PGHOME ends up being /usr/pkg/pgsql, which is not under VARBASE, but I'm letting that be because a change would be disruptive.
2014-03-11Import initial SMF support for individual packages.jperkin3-1/+97
2014-03-11Remove example rc.d scripts from PLISTs.jperkin1-2/+1
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or ignored otherwise.
2014-02-23Changes:adam2-9/+2
This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. This update also fixes some issues which affect binary replication and row locking, and can cause recoverable data corruption in some cases. In addition to the above, the following issues are fixed in this release: Fix WAL logging of visibility map change Make sure that GIN indexes log all insertions Get pause_at_recovery_target to pause at correct time Ensure walreceiver sends hot-standby feedback messages on time Prevent timeout interrupts from taking control away from mainline code Eliminate several race conditions Fix some broken HINTs in error messages Prevent server lockup on SSL connection loss Fix two Unicode handling issues Prevent crash on certain subselect syntax Prevent crash on select from zero column table Fix two bugs with LATERAL Fix issue with UNION ALL, partitioning, and updates Ensure that ANALYZE understands domains over ranges Eliminate permissions check when using default tablespace Fix memory leakage in JSON functions Allow extensions with event triggers Distinguish numbers correctly in JSON output Fix permissions for pg_start_backup() and pg_stop_backup() Accept SHIFT_JIS as locale name Fix .* expansion for SQL function variables Prevent infinite loop on some COPY connection failures Several fixes for client issues on Windows Enable building PostgreSQL with Visual Studio 2013 Update time zone files for recent changes
2014-02-12Recursive PKGREVISION bump for OpenSSL API version bump.tron1-1/+2
2013-10-12Changesadam1-2/+1
Guarantee transmission of all WAL files before replica failover Prevent downcasing of non-ASCII identifiers Fix several minor memory leaks Correct overcommit behavior when using more than 24GB of work memory Improve planner cost estimates for choosing generic plans Fix estimates of NULL rows in boolean columns Make UNION ALL and inheritance query plans recheck parameterized paths Correct pg_dump bugs for foreign tables, views, and extensions Prevent a parallel pg_restore failure on certain indexes Make REINDEX revalidate constraints Prevent two deadlock issues in SP-GIST and REINDEX CONCURRENTLY Prevent GiST index lookup crash Fix several regular expression failures Allow ALTER DEFAULT PRIVILEGES to work on all schemas Loosen restrictions on keywords Allow various spellings of infinity Expand ability to compare rows to records and arrays Prevent psql client crash on bad PSQLRC file Add spinlock support for ARM64
2013-07-12Bump PKGREVISION of all packages which create users, to pick up change ofjperkin1-1/+2
sysutils/user_* packages.
2013-04-04The PostgreSQL Global Development Group has released a security update to ↵adam1-1/+4
all current versions of the PostgreSQL database system, including versions 9.2.4, 9.1.9, 9.0.13, and 8.4.17. This update fixes a high-exposure security vulnerability in versions 9.0 and later. All users of the affected versions are strongly urged to apply the update immediately. A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902.
2013-02-09The PostgreSQL Global Development Group has released a security update to ↵adam2-9/+3
all current versions of the PostgreSQL database system, including versions 9.2.3, 9.1.8, 9.0.12, 8.4.16, and 8.3.23. This update fixes a denial-of-service (DOS) vulnerability. All users should update their PostgreSQL installations as soon as possible. The security issue fixed in this release, CVE-2013-0255, allows a previously authenticated user to crash the server by calling an internal function with invalid arguments. This issue was discovered by independent security researcher Sumit Soni this week and reported via Secunia SVCRP, and we are grateful for their efforts in making PostgreSQL more secure. Today's update also fixes a performance regression which caused a decrease in throughput when using dynamic queries in stored procedures in version 9.2. Applications which use PL/pgSQL's EXECUTE are strongly affected by this regression and should be updated. Additionally, we have fixed intermittent crashes caused by CREATE/DROP INDEX CONCURRENTLY, and multiple minor issues with replication. This release is expected to be the final update for version 8.3, which is now End-of-Life (EOL). Users of version 8.3 should plan to upgrade to a later version of PostgreSQL immediately. For more information, see our Versioning Policy. This update release also contains fixes for many minor issues discovered and patched by the PostgreSQL community in the last two months, including: * Prevent unnecessary table scans during vacuuming * Prevent spurious cached plan error in PL/pgSQL * Allow sub-SELECTs to be subscripted * Prevent DROP OWNED from dropping databases or tablespaces * Make ECPG use translated messages * Allow PL/Python to use multi-table trigger functions (again) in 9.1 and 9.2 * Fix several activity log management issues on Windows * Prevent autovacuum file truncation from being cancelled by deadlock_timeout * Make extensions build with the .exe suffix automatically on Windows * Fix concurrency issues with CREATE/DROP DATABASE * Reject out-of-range values in to_date() conversion function * Revert cost estimation for large indexes back to pre-9.2 behavior * Make pg_basebackup tolerate timeline switches * Cleanup leftover temp table entries during crash recovery * Prevent infinite loop when COPY inserts a large tuple into a table with a large fillfactor * Prevent integer overflow in dynahash creation * Make pg_upgrade work with INVALID indexes * Fix bugs in TYPE privileges * Allow Contrib installchecks to run in their own databases * Many documentation updates * Add new timezone "FET".
2013-02-06PKGREVISION bumps for the security/openssl 1.0.1d update.jperkin1-2/+2
2012-12-16recursive bump from cyrus-sasl libsasl2 shlib major bump.obache1-1/+2
2012-10-02Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-07-01Security update to version 9.1.4.morr2-3/+3
Changes: * Fix incorrect password transformation in contrib/pgcrypto's DES crypt() function (Solar Designer) * Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (Tom Lane) * Make contrib/citext's upgrade script fix collations of citext arrays and domains over citext (Tom Lane) * Allow numeric timezone offsets in timestamp input to be up to 16 hours away from UTC (Tom Lane) * Fix timestamp conversion to cope when the given time is exactly the last DST transition time for the current timezone (Tom Lane) * Fix text to name and char to name casts to perform string truncation correctly in multibyte encodings (Karl Schnaitter) * Fix memory copying bug in to_tsquery() (Heikki Linnakangas) * Ensure txid_current() reports the correct epoch when executed in hot standby (Simon Riggs) * Fix planner's handling of outer PlaceHolderVars within subqueries (Tom Lane) * Fix planning of UNION ALL subqueries with output columns that are not simple variables (Tom Lane) * Fix slow session startup when pg_attribute is very large (Tom Lane) * Ensure sequential scans check for query cancel reasonably often (Merlin Moncure) * Ensure the Windows implementation of PGSemaphoreLock() clears ImmediateInterruptOK before returning (Tom Lane) * Show whole-row variables safely when printing views or rules (Abbas Butt, Tom Lane) * Fix COPY FROM to properly handle null marker strings that correspond to invalid encoding (Tom Lane) * Fix EXPLAIN VERBOSE for writable CTEs containing RETURNING clauses (Tom Lane) * Fix PREPARE TRANSACTION to work correctly in the presence of advisory locks (Tom Lane) * Fix truncation of unlogged tables (Robert Haas) * Ignore missing schemas during non-interactive assignments of search_path (Tom Lane) * Fix bugs with temporary or transient tables used in extension scripts (Tom Lane) * Ensure autovacuum worker processes perform stack depth checking properly (Heikki Linnakangas) * Fix logging collector to not lose log coherency under high load (Andrew Dunstan) * Fix logging collector to ensure it will restart file rotation after receiving SIGHUP (Tom Lane) * Fix "too many LWLocks taken" failure in GiST indexes (Heikki Linnakangas) * Fix WAL replay logic for GIN indexes to not fail if the index was subsequently dropped (Tom Lane) * Correctly detect SSI conflicts of prepared transactions after a crash (Dan Ports) * Avoid synchronous replication delay when committing a transaction that only modified temporary tables (Heikki Linnakangas) * Fix error handling in pg_basebackup (Thomas Ogrisegg, Fujii Masao) * Fix walsender to not go into a busy loop if connection is terminated (Fujii Masao) * Fix memory leak in PL/pgSQL's RETURN NEXT command (Joe Conway) * Fix PL/pgSQL's GET DIAGNOSTICS command when the target is the function's first variable (Tom Lane) * Ensure that PL/Perl package-qualifies the _TD variable (Alex Hunsaker) * Fix PL/Python functions returning composite types to accept a string for their result value (Jan Urbanski) * Fix potential access off the end of memory in psql's expanded display (\x) mode (Peter Eisentraut) * Fix several performance problems in pg_dump when the database contains many objects (Jeff Janes, Tom Lane) * Fix memory and file descriptor leaks in pg_restore when reading a directory-format archive (Peter Eisentraut) * Fix pg_upgrade for the case that a database stored in a non-default tablespace contains a table in the cluster's default tablespace (Bruce Momjian) * In ecpg, fix rare memory leaks and possible overwrite of one byte after the sqlca_t structure (Peter Eisentraut) * Fix contrib/dblink's dblink_exec() to not leak temporary database connections upon error (Tom Lane) * Fix contrib/dblink to report the correct connection name in error messages (Kyotaro Horiguchi) * Fix contrib/vacuumlo to use multiple transactions when dropping many large objects (Tim Lewis, Robert Haas, Tom Lane) * Update time zone data files to tzdata release 2012c for DST law changes in Antarctica, Armenia, Chile, Cuba, Falkland Islands, Gaza, Haiti, Hebron, Morocco, Syria, and Tokelau Islands;
2012-06-14Recursive PKGREVISION bump for libxml2 buildlink addition.sbd1-1/+2
2012-03-03Changes:adam1-1/+3
* Fix btree index corruption from insertions concurrent with vacuuming * Recover from errors occurring during WAL replay of DROP TABLESPACE * Fix transient zeroing of shared buffers during WAL replay * Fix postmaster to attempt restart after a hot-standby crash * Fix corner case in SSI transaction cleanup * Update per-column permissions, not only per-table permissions, when changing table owner * Fix handling of data-modifying WITH subplans in READ COMMITTED rechecking * Fix for "could not find plan for CTE" failures * Fix unsupported node type error caused by COLLATE in an INSERT expression * Avoid crashing when we have problems deleting table files post-commit * Fix recently-introduced memory leak in processing of inet/cidr * Fix GIN cost estimation to handle column IN (...) index conditions * Fix I/O-conversion-related memory leaks in plpgsql * Teach pg_upgrade to handle renaming of plpython's shared library (affecting upgrades to 9.1)
2011-12-06Changes 9.1.2:adam1-1/+2
* Fix bugs in information_schema.referential_constraints view * Correct collations for citext columns and indexes * Prevent possible crash when joining to a scalar function * Prevent transitory data corruption of GIN indexes after a crash * Prevent data corruption on TOAST columns when copying data * Fix failures during hot standby startup * Correct another "variable not found in subplan target list" bug * Fix bug with sorting on aggregate expressions in windowing functions * Multiple bug fixes for pg_upgrade * Change Foreign Key creation order to better support self-referential keys * Multiple bug fixes to CREATE EXTENSION * Ensure that function return type and data returned from PL/perl agree * Ensure that PL/perl strings are always UTF-8 * Assorted bug fixes for various Extensions * Updates to the time zone database, particularly to CST6
2011-09-27Changes 9.1.1:adam1-1/+2
* Make pg_options_to_table return NULL for an option with no value * Fix memory leak at end of a GiST index scan * Fix explicit reference to pg_temp schema in "CREATE TEMPORARY TABLE"
2011-09-27Fix for PR#45403adam1-4/+4
2011-09-15Version 9.1 delivers several features which users have been requesting foradam6-0/+943
years, removing roadblocks to deploying new or ported applications on PostgreSQL. These include: * Synchronous Replication: enable high-availability with consistency across multiple servers * Per-Column Collations: support linguistically-correct sorting per database, table or column. * Unlogged Tables: greatly improves performance for ephemeral data Our community of contributors innovates with cutting-edge features. Version 9.1 includes several which are new to the database industry, such as: * K-Nearest-Neighbor Indexing: index on "distance" for faster location and text search queries * Serializable Snapshot Isolation: keeps concurrent transactions consistent without blocking, using "true serializability" * Writeable Common Table Expressions: execute complex multi-stage data updates in a single query * Security-Enhanced Postgres: deploy military-grade security and Mandatory Access Control