Next | Query returned 31 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2022-04-24 19:50:27 by Tobias Nygren | Files touched by this commit (47) | Package removed
Log message:
retire postgresql96 (EOL)
   2022-04-18 21:12:27 by Adam Ciarcinski | Files touched by this commit (1798) | Package updated
Log message:
revbump for textproc/icu update
   2021-12-08 17:07:18 by Adam Ciarcinski | Files touched by this commit (3063)
Log message:
revbump for icu and libffi
   2021-11-16 11:14:39 by Adam Ciarcinski | Files touched by this commit (27) | Package updated
Log message:
postgresql: updated to 14.1, 13.5, 12.9, 11.14, 10.19, 9.6.24

PostgreSQL 14.1, 13.5, 12.9, 11.14, 10.19, and 9.6.24

Security Issues

CVE-2021-23214: Server processes unencrypted bytes from man-in-the-middle

Versions Affected: 9.6 - 14. The security team typically does not test \ 
unsupported versions, but this problem is quite old.

When the server is configured to use trust authentication with a clientcert \ 
requirement or to use cert authentication, a man-in-the-middle attacker can \ 
inject arbitrary SQL queries when a connection is first established, despite the \ 
use of SSL certificate verification and encryption.

The PostgreSQL project thanks Jacob Champion for reporting this problem.

CVE-2021-23222: libpq processes unencrypted bytes from man-in-the-middle

Versions Affected: 9.6 - 14. The security team typically does not test \ 
unsupported versions, but this problem is quite old.

A man-in-the-middle attacker can inject false responses to the client's first \ 
few queries, despite the use of SSL certificate verification and encryption.

If more preconditions hold, the attacker can exfiltrate the client's password or \ 
other confidential data that might be transmitted early in a session. The \ 
attacker must have a way to trick the client's intended server into making the \ 
confidential data accessible to the attacker. A known implementation having that \ 
property is a PostgreSQL configuration vulnerable to CVE-2021-23214.

As with any exploitation of CVE-2021-23214, the server must be using trust \ 
authentication with a clientcert requirement or using cert authentication. To \ 
disclose a password, the client must be in possession of a password, which is \ 
atypical when using an authentication configuration vulnerable to \ 
CVE-2021-23214. The attacker must have some other way to access the server to \ 
retrieve the exfiltrated data (a valid, unprivileged login account would be \ 
sufficient).

The PostgreSQL project thanks Jacob Champion for reporting this problem.

Bug Fixes and Improvements

This update fixes over 40 bugs that were reported in the last several months. \ 
The issues listed below affect PostgreSQL 14. Some of these issues may also \ 
affect other supported versions of PostgreSQL.

Some of these fixes include:

Fix physical replication for cases where the primary crashes after shipping a \ 
WAL segment that ends with a partial WAL record. When applying this update, \ 
update your standby servers before the primary so that they will be ready to \ 
handle the fix if the primary happens to crash.
Fix parallel VACUUM so that it will process indexes below the \ 
min_parallel_index_scan_size threshold if the table has at least two indexes \ 
that are above that size. This problem does not affect autovacuum. If you are \ 
affected by this issue, you should reindex any manually-vacuumed tables.
Fix causes of CREATE INDEX CONCURRENTLY and REINDEX CONCURRENTLY writing corrupt \ 
indexes. You should reindex any concurrently-built indexes.
Fix for attaching/detaching a partition that could allow certain INSERT/UPDATE \ 
queries to misbehave in active sessions.
Fix for creating a new range type with CREATE TYPE that could cause problems for \ 
later event triggers or subsequent executions of the CREATE TYPE command.
Fix updates of element fields in arrays of a domain that is a part of a composite.
Disallow the combination of FETCH FIRST WITH TIES and FOR UPDATE SKIP LOCKED.
Fix corner-case loss of precision in the numeric power() function.
Fix restoration of a Portal's snapshot inside a subtransaction, which could lead \ 
to a crash. For example, this could occur in PL/pgSQL when a COMMIT is \ 
immediately followed by a BEGIN ... EXCEPTION block that performs a query.
Clean up correctly if a transaction fails after exporting its snapshot. This \ 
could occur if a replication slot was created then rolled back, and then another \ 
replication slot was created in the same session.
Fix for "overflowed-subtransaction" wraparound tracking on standby \ 
servers that could lead to performance degradation.
Ensure that prepared transactions are properly accounted for during promotion of \ 
a standby server.
Ensure that the correct lock level is used when renaming a table.
Avoid crash when dropping a role that owns objects being dropped concurrently.
Disallow setting huge_pages to on when shared_memory_type is sysv
Fix query type checking in the PL/pgSQL RETURN QUERY.
Several fixes for pg_dump, including the ability to dump non-global default \ 
privileges correctly.
Use the CLDR project's data to map Windows time zone names to IANA time zones.
This update also contains tzdata release 2021e for DST law changes in Fiji, \ 
Jordan, Palestine, and Samoa, plus historical corrections for Barbados, Cook \ 
Islands, Guyana, Niue, Portugal, and Tonga.

Also, the Pacific/Enderbury zone has been renamed to Pacific/Kanton. Also, the \ 
following zones have been merged into nearby, more-populous zones whose clocks \ 
have agreed with them since 1970: Africa/Accra, America/Atikokan, \ 
America/Blanc-Sablon, America/Creston, America/Curacao, America/Nassau, \ 
America/Port_of_Spain, Antarctica/DumontDUrville, and Antarctica/Syowa. In all \ 
these cases, the previous zone name remains as an alias.
   2021-08-13 13:54:48 by Adam Ciarcinski | Files touched by this commit (55) | Package updated
Log message:
postgresql: updated to 13.4, 12.8, 11.13, 10.18, 9.6.23

PostgreSQL 13.4, 12.8, 11.13, 10.18, 9.6.23

Security Issues

CVE-2021-3677: Memory disclosure in certain queries

Versions Affected: 11 - 13.

A purpose-crafted query can read arbitrary bytes of server memory. In the \ 
default configuration, any authenticated database user can complete this attack \ 
at will. The attack does not require the ability to create objects. If server \ 
settings include max_worker_processes=0, the known versions of this attack are \ 
infeasible. However, undiscovered variants of the attack may be independent of \ 
that setting.

Bug Fixes and Improvements

This update also fixes over 75 bugs that were reported in the last several \ 
months. Some of these issues affect only version 13, but many affect all \ 
supported versions.

Some of these fixes include:

Completely disable TLS/SSL renegotiation. This was previously disabled, but the \ 
server would still execute a client-initiated renegotiation request.
Restore the Portal-level snapshot after COMMIT or ROLLBACK within a procedure. \ 
This change fixes cases where an attempt to fetch a toasted value immediately \ 
after COMMIT/ROLLBACK would fail with errors like "no known snapshots" \ 
or "missing chunk number 0 for toast value".
Avoid misbehavior when persisting the output of a cursor that's reading a \ 
volatile query.
Reject cases where a query in WITH rewrites to just NOTIFY, which would cause a \ 
crash.
Several corner-case fixes for numeric types.
ALTER EXTENSION now locks the extension when adding or removing a member object.
The "enabled" status is now copied when a partitioned table's triggers \ 
are cloned to a new partition.
Avoid alias conflicts in queries generated for REFRESH MATERIALIZED VIEW \ 
CONCURRENTLY. This command failed on materialized views containing columns with \ 
certain names, notably mv and newdata.
Disallow whole-row variables in GENERATED expressions.
Several fixes for DROP OWNED BY behavior in relation to row-level security (RLS) \ 
policies.
Re-allow old-style Windows locale names in CREATE COLLATION commands.
walsenders now show their latest replication command in pg_stat_activity, \ 
instead of just showing the latest SQL command.
pg_settings.pending_restart now shows as true when a pertinent entry in \ 
postgresql.conf is removed.
On 64-bit Windows, allow the effective value of work_mem * hash_mem_multiplier \ 
to exceed 2GB.
Update minimum recovery point when WAL replay of a transaction abort record \ 
causes file truncation.
Advance oldest-required-WAL-segment horizon properly after a replication slot is \ 
invalidated. This fixes an issue where the server's WAL storage could run out of \ 
space.
Improve progress reporting for the sort phase of a parallel B-tree index build.
Fix assorted crash cases in logical replication of partitioned-table updates and \ 
when firing AFTER triggers of partitioned tables.
Prevent infinite loops in SP-GiST index insertion.
Ensure that SP-GiST index insertion can be terminated by a query cancel request.
In psql and other client programs, avoid overrunning the ends of strings when \ 
dealing with invalidly-encoded data.
Fix pg_dump to correctly handle triggers on partitioned tables whose enabled \ 
status is different from their parent triggers' status.
Avoid "invalid creation date in header" warnings when running \ 
pg_restore on a file created in a different time zone.
pg_upgrade now carries forward the old installation's oldestXID value and no \ 
longer forces an anti-wraparound VACUUM."
Extend pg_upgrade to detect and warn about extensions that should be upgraded.
Fix contrib/postgres_fdw to better work with generated columns, so long as a \ 
generated column in a foreign table represents a generated column in the remote \ 
table.
   2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575)
Log message:
*: recursive bump for perl 5.34
   2021-05-18 13:56:23 by Adam Ciarcinski | Files touched by this commit (65) | Package updated
Log message:
postgresql: updated to 13.3, 12.7, 11.12, 10.17, 9.6.22

PostgreSQL 13.3, 12.7, 11.12, 10.17, and 9.6.22 Released!

Posted on 2021-05-13 by PostgreSQL Global Development Group
 PostgreSQL Project  Security
The PostgreSQL Global Development Group has released an update to all supported \ 
versions of our database system, including 13.3, 12.7, 11.12, 10.17, and 9.6.22. \ 
This release closes three security vulnerabilities and fixes over 45 bugs \ 
reported over the last three months.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-32027: Buffer overrun from integer overflow in array subscripting \ 
calculations

Versions Affected: 9.6 - 13. The security team typically does not test \ 
unsupported versions, but this problem is quite old.

While modifying certain SQL array values, missing bounds checks let \ 
authenticated database users write arbitrary bytes to a wide area of server \ 
memory.

The PostgreSQL project thanks Tom Lane for reporting this problem.

CVE-2021-32028: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

Versions Affected: 9.6 - 13. The security team typically does not test \ 
unsupported versions. The feature first appeared in 9.5.

Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted \ 
table, an attacker can read arbitrary bytes of server memory. In the default \ 
configuration, any authenticated database user can create prerequisite objects \ 
and complete this attack at will. A user lacking the CREATE and TEMPORARY \ 
privileges on all databases and the CREATE privilege on all schemas cannot use \ 
this attack at will.

The PostgreSQL project thanks Andres Freund for reporting this problem.

CVE-2021-32029: Memory disclosure in partitioned-table UPDATE ... RETURNING

Versions Affected: 11 - 13

Using an UPDATE ... RETURNING on a purpose-crafted partitioned table, an \ 
attacker can read arbitrary bytes of server memory. In the default \ 
configuration, any authenticated database user can create prerequisite objects \ 
and complete this attack at will. A user lacking the CREATE and TEMPORARY \ 
privileges on all databases and the CREATE privilege on all schemas typically \ 
cannot use this attack at will.

The PostgreSQL project thanks Tom Lane for reporting this problem.

Bug Fixes and Improvements

This update fixes over 45 bugs that were reported in the last several months. \ 
Some of these issues only affect version 13, but could also apply to other \ 
supported versions.

Some of these fixes include:

Fix potential incorrect computation of UPDATE ... RETURNING outputs for joined, \ 
cross-partition updates.
Fix ALTER TABLE ... ALTER CONSTRAINT when used on foreign-key constraints on \ 
partitioned tables. The command would fail to adjust the DEFERRABLE and/or \ 
INITIALLY DEFERRED properties of the constraints and triggers of leaf \ 
partitions, leading to unexpected behavior. After updating to this version, you \ 
can execute the ALTER TABLE ... ALTER CONSTRAINT command to fix any misbehaving \ 
partitioned tables.
Ensure that when a child table is attached with ALTER TABLE ... INHERIT that \ 
generated columns in the parent are generated in the same way in the child.
Forbid marking an identity column as NULL.
Allow ALTER ROLE ... SET/ALTER DATABASE ... SET to set the role, \ 
session_authorization, and temp_buffers parameters.
Ensure that REINDEX CONCURRENTLY preserves any statistics target set for the index.
Fix an issue where, in some cases, saving records within AFTER triggers could \ 
cause crashes.
Fix how to_char() handles Roman-numeral month format codes with negative intervals.
Fix use of uninitialized value while parsing an \{m,n\} quantifier in a BRE-mode \ 
regular expression.
Fix "could not find pathkey item to sort" planner errors that occur in \ 
some situations when the sort key involves an aggregate or window function.
Fix issue with BRIN index bitmap scans that could lead to "could not open \ 
file" errors.
Fix potentially wrong answers from GIN tsvector index searches when there are \ 
many matching records.
Fixes for COMMIT AND CHAIN functionality on both the server and psql.
Avoid incorrect timeline change while recovering uncommitted two-phase \ 
transactions from WAL, which could lead to consistency issues and the inability \ 
to restart the server.
Ensure thatwal_sync_method is set to fdatasync by default on newer FreeBSD releases.
Disable the vacuum_cleanup_index_scale_factor parameter and storage option.
Fix several memory leaks in the server, including one with SSL/TLS parameter \ 
initialization.
Restore the previous behavior of \connect service=XYZ to psql, i.e. disallow \ 
environmental variables (e.g. PGPORT) from overriding entries in the service \ 
file.
Fix how pg_dump handles generated columns in partitioned tables.
Add additional checks to pg_upgrade for user tables containing non-upgradable \ 
data types.
On Windows, initdb now prints instructions about how to start the server with \ 
pg_ctl using backslash separators.
Fix pg_waldump to count XACT records correctly when generating per-record statistics.
   2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822)
Log message:
revbump for textproc/icu
   2021-02-15 19:58:42 by Adam Ciarcinski | Files touched by this commit (57) | Package updated
Log message:
postgresql: updated to 13.2, 12.6, 11.11, 10.16, 9.6.21, and 9.5.25

The PostgreSQL Global Development Group has released an update to all supported \ 
versions of our database system, including 13.2, 12.6, 11.11, 10.16, 9.6.21, and \ 
9.5.25. This release closes two security vulnerabilities and fixes over 80 bugs \ 
reported over the last three months.

Additionally, this is the final release of PostgreSQL 9.5. If you are running \ 
PostgreSQL 9.5 in a production environment, we suggest that you make plans to \ 
upgrade.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-3393: Partition constraint violation errors leak values of denied columns

Versions Affected: 11 - 13.

A user having an UPDATE privilege on a partitioned table but lacking the SELECT \ 
privilege on some column may be able to acquire denied-column values from an \ 
error message. This is similar to CVE-2014-8161, but the conditions to exploit \ 
are more rare.

The PostgreSQL project thanks Heikki Linnakangas for reporting this problem.

CVE-2021-20229: Single-column SELECT privilege enables reading all columns

Versions Affected: 13.

A user having a SELECT privilege on an individual column can craft a special \ 
query that returns all columns of the table.

Additionally, a stored view that uses column-level privileges will have \ 
incomplete column-usage bitmaps. In installations that depend on column-level \ 
permissions for security, it is recommended to execute CREATE OR REPLACE on all \ 
user-defined views to force them to be re-parsed.

The PostgreSQL project thanks Sven Klemm for reporting this problem.

Bug Fixes and Improvements

This update fixes over 80 bugs that were reported in the last several months. \ 
Some of these issues only affect version 13, but could also apply to other \ 
supported versions.

Some of these fixes include:

Fix an issue with GiST indexes where concurrent insertions could lead to a \ 
corrupt index with entries placed in the wrong pages. You should REINDEX any \ 
affected GiST indexes.
Fix CREATE INDEX CONCURRENTLY to ensure rows from concurrent prepared \ 
transactions are included in the index. Installations that have enabled prepared \ 
transactions should REINDEX any concurrently-built indexes.
Fix for possible incorrect query results when a hash aggregation is spilled to disk.
Fix edge case in incremental sort that could lead to sorting results incorrectly \ 
or a "retrieved too many tuples in a bounded sort" error.
Avoid crash when a CALL or DO statement that performs a transaction rollback is \ 
executed via extended query protocol, such as from prepared statements.
Fix a failure when a PL/pgSQL procedure used CALL on another procedure that has \ 
OUT parameters that executed a COMMIT or ROLLBACK.
Remove errors from BEFORE UPDATE triggers on partitioned tables for restrictions \ 
that no longer apply.
Several fixes for queries with joins that could lead to error messages such as \ 
"no relation entry for relid N" or "failed to build any N-way \ 
joins".
Do not consider parallel-restricted or set-returning functions in an ORDER BY \ 
expressions when trying to parallelize sorts.
Fix ALTER DEFAULT PRIVILEGES to handle duplicate arguments safely.
Several fixes in behavior when wal_level is set to minimal, including when \ 
tables are rewritten within a transaction.
Several fixes for CREATE TABLE LIKE.
Ensure that allocated disk space for a dropped relation (e.g. a table) is \ 
released promptly when a transaction is committed.
Fix progress reporting for CLUSTER.
Fix handling of backslash-escaped multibyte characters in COPY FROM.
Fix recently-introduced race conditions in LISTEN/NOTIFY queue handling.
Allow the jsonb concatenation operator (||) to handle all combinations of JSON \ 
data types.
Fix WAL-reading logic so that standbys can handle timeline switches correctly. \ 
This issue could have shown itself with errors like "requested WAL segment \ 
has already been removed".
Several leak fixes for the walsender process around logical decoding and replication.
Ensure that a nonempty value of krb_server_keyfile always overrides any setting \ 
of KRB5_KTNAME in the server environment
Several fixes for GSS encryption support.
Ensure the \connect command allows the use of a password in the \ 
connection_string argument.
Fix assorted bugs with the \help command.
Several fixes for pg_dump.
Ensure that pg_rewind accounts for all WAL when rewinding a standby server.
Fix memory leak in contrib/auto_explain.
Ensure all postgres_fdw connections are closed if the a user mapping or foreign \ 
server object those connections depend on are dropped.
Fix JIT compilation to be compatible with LLVM 11 and LLVM 12.
This update also contains tzdata release 2021a for DST law changes in Russia \ 
(Volgograd zone) and South Sudan, plus historical corrections for Australia, \ 
Bahamas, Belize, Bermuda, Ghana, Israel, Kenya, Nigeria, Palestine, Seychelles, \ 
and Vanuatu.

Notably, the Australia/Currie zone has been corrected to the point where it is \ 
identical to Australia/Hobart.

For the full list of changes available, please review the release notes.

PostgreSQL 9.5 is EOL

This is the final release of PostgreSQL 9.5. If you are running PostgreSQL 9.5 \ 
in a production environment, we suggest that you make plans to upgrade to a \ 
newer, supported version of PostgreSQL. Please see our versioning policy for \ 
more information.
   2020-12-04 05:56:20 by Taylor R Campbell | Files touched by this commit (391)
Log message:
Revbump for openpam cppflags change months ago, belatedly.

Next | Query returned 31 messages, browsing 1 to 10 | Previous