13 Commits

Author SHA1 Message Date
Palle Girgensohn
70184a53b3 2018-03-01 Security Update Release
The PostgreSQL Global Development Group has released an update to all supported
versions of the PostgreSQL database system, including 10.3, 9.6.8, 9.5.12,
9.4.17, and 9.3.22.

The purpose of this release is to address CVE-2018-1058, which describes how a
user can create like-named objects in different schemas that can change the
behavior of other users' queries and cause unexpected or malicious behavior,
also known as a "trojan-horse" attack. Most of this release centers around added
documentation that describes the issue and how to take steps to mitigate the
impact on PostgreSQL databases.

We strongly encourage all of our users to please visit
https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path
for a detailed explanation of CVE-2018-1058 and how to protect your PostgreSQL
installations.

After evaluating the documentation for CVE-2018-1058, a database administrator
may need to take follow up steps on their PostgreSQL installations to ensure
they are protected from exploitation.

Security:	CVE-2018-1058
2018-03-01 15:10:17 +00:00
Dmitry Marakasov
7184f1831f - Include pg_regress to all postgresql*-client ports, to allow running regression tests for postgresql extensions
PR:		217874
Approved by:	maintainer timeout (pgsql, 4 months)
2017-07-17 11:15:50 +00:00
Palle Girgensohn
70a06c4f2e Update PostgreSQL to latest versions.
Security Fixes for Regular Expressions, PL/Java

This release closes security hole CVE-2016-0773, an issue with regular
expression (regex) parsing. Prior code allowed users to pass in expressions
which included out-of-range Unicode characters, triggering a backend crash.
This issue is critical for PostgreSQL systems with untrusted users or which
generate regexes based on user input.

The update also fixes CVE-2016-0766, a privilege escalation issue for users of
PL/Java.  Certain custom configuration settings (GUCS) for PL/Java will now be
modifiable only by the database superuser

URL:		http://www.postgresql.org/about/news/1644/
Security:	CVE-2016-0773, CVE-2016-0766
2016-02-13 22:42:04 +00:00
Baptiste Daroussin
bc46027203 Simplify a bit the Makefiles
Use OPTIONS_SUB to automatically PLIST_SUB
Use OPTIONS helpers
2015-07-22 22:45:35 +00:00
Baptiste Daroussin
ab7ead91d4 Cleanup plist and avoid useless @exec 2015-07-22 21:46:27 +00:00
Palle Girgensohn
262af710e7 Update PostgreSQL-9.x to latests versions.
This update fixes multiple security issues reported in PostgreSQL over the past
few months. All of these issues require prior authentication, and some require
additional conditions, and as such are not considered generally urgent.
However, users should examine the list of security holes patched below in case
they are particularly vulnerable.

Security:	CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
		CVE-2015-0244,CVE-2014-8161
2015-02-05 22:54:34 +00:00
Antoine Brodin
4d4db2684b Stage support
Reviewed by:	postgresql@
Tested by:	miwi and me
2014-02-26 17:24:35 +00:00
Chris Rees
bf38d56e30 Fix plist
PR:		ports/182489
Submitted by:	antoine
2013-09-29 20:19:01 +00:00
Palle Girgensohn
a50609f354 Update PostgreSQL 93 to beta 2.
URL:	http://www.postgresql.org/about/news/1471/
2013-06-28 10:50:51 +00:00
Palle Girgensohn
6af63b8fc7 pkgconfig belongs under libdata 2013-05-12 22:28:38 +00:00
Palle Girgensohn
45704cebea Update postgresql93-client to properly depend on pkgconfig
Reported by: Ports-QAT
2013-05-12 21:09:38 +00:00
Palle Girgensohn
3a20a08143 Add postgresql 9.3 beta1 2013-05-12 00:00:56 +00:00
Palle Girgensohn
740b7ff067 Prepare for postgresql 9.3 beta 1 by svn cp postgresql92-* postgresql93-* 2013-05-11 23:46:30 +00:00