Path to this page:
NOTICE: This package has been removed from pkgsrc./
databases/postgresql92-plperl,
PL/Perl procedural language for the PostgreSQL backend
Branch: CURRENT,
Version: 9.2.24nb1,
Package name: postgresql92-plperl-9.2.24nb1,
Maintainer: adamPL/Perl allows you to write functions in the Perl programming language
that may be used in SQL queries as if they were built into Postgres.
The PL/Perl intepreter is a full Perl interpreter. However, certain
operations have been disabled in order to maintain the security of the
system.
Required to run:[
textproc/libxml2] [
lang/perl5] [
databases/postgresql92-server] [
databases/postgresql92-client]
Required to build:[
pkgtools/cwrappers]
Package options: kerberos
Master sites:
SHA1: 63d6966ccdbab6aae1f9754fdb8e341ada1ef653
RMD160: 2fc1b9c37cfefd5fae5bd02f974484c5fc680c08
Filesize: 16164.625 KB
Version history: (Expand)
- (2018-05-22) Package deleted from pkgsrc
- (2017-12-15) Updated to version: postgresql92-plperl-9.2.24nb1
- (2017-11-23) Package has been reborn
- (2017-11-15) Updated to version: postgresql92-plperl-9.2.24
- (2017-09-09) Updated to version: postgresql92-plperl-9.2.23
- (2017-08-31) Updated to version: postgresql92-plperl-9.2.22
CVS history: (Expand)
2018-05-21 10:06:41 by Adam Ciarcinski | Files touched by this commit (54) | |
Log message:
Removed (jdbc-)postgresql92(-*)
|
2017-12-15 17:57:25 by David A. Holland | Files touched by this commit (16) |
Log message:
Bump PKGREVISION of postgresql92 and postgresql93 packages (all to 1)
for the PR 52787 options adjustment, as a precaution.
|
2016-08-23 08:28:16 by Adam Ciarcinski | Files touched by this commit (42) | |
Log message:
The PostgreSQL Global Development Group has released an update to all supported \
versions of our database system, including 9.5.4, 9.4.9, 9.3.14, 9.2.18 and \
9.1.23. This release fixes two security issues. It also patches a number of \
other bugs reported over the last three months. Users who rely on security \
isolation between database users should update as soon as possible. Other users \
should plan to update at the next convenient downtime.
Security Issues
---------------
Two security holes have been closed by this release:
CVE-2016-5423: certain nested CASE expressions can cause the server to crash.
CVE-2016-5424: database and role names with embedded special characters can \
allow code injection during administrative operations like pg_dumpall.
The fix for the second issue also adds an option, -reuse-previous, to psql's \
\connect command. pg_dumpall will also refuse to handle database and role names \
containing line breaks after the update. For more information on these issues \
and how they affect backwards-compatibility, see the Release Notes.
Bug Fixes and Improvements
--------------------------
This update also fixes a number of bugs reported in the last few months. Some of \
these issues affect only version 9.5, but many affect all supported versions:
Fix misbehaviors of IS NULL/IS NOT NULL with composite values
Fix three areas where INSERT ... ON CONFLICT failed to work properly with other \
SQL features.
Make INET and CIDR data types properly reject bad IPv6 values
Prevent crash in "point ## lseg" operator for NaN input
Avoid possible crash in pg_get_expr()
Fix several one-byte buffer over-reads in to_number()
Don't needlessly plan query if WITH NO DATA is specified
Avoid crash-unsafe state in expensive heap_update() paths
Fix hint bit update during WAL replay of row locking operations
Avoid unnecessary "could not serialize access" with FOR KEY SHARE
Avoid crash in postgres -C when the specified variable is a null string
Fix two issues with logical decoding and subtransactions
Ensure that backends see up-to-date statistics for shared catalogs
Prevent possible failure when vacuuming multixact IDs in an upgraded database
When a manual ANALYZE specifies columns, don't reset changes_since_analyze
Fix ANALYZE's overestimation of n_distinct for columns with nulls
Fix bug in b-tree mark/restore processing
Fix building of large (bigger than shared_buffers) hash indexes
Prevent infinite loop in GiST index build with NaN values
Fix possible crash during a nearest-neighbor indexscan
Fix "PANIC: failed to add BRIN tuple" error
Prevent possible crash during background worker shutdown
Many fixes for issues in parallel pg_dump and pg_restore
Make pg_basebackup accept -Z 0 as no compression
Make regression tests safe for Danish and Welsh locales
|
2016-07-09 08:39:18 by Thomas Klausner | Files touched by this commit (1068) |
Log message:
Bump PKGREVISION for perl-5.24.0 for everything mentioning perl.
|
2016-04-09 14:51:50 by Adam Ciarcinski | Files touched by this commit (90) | |
Log message:
The PostgreSQL Global Development Group has released an update to all supported \
versions of our database system, including 9.5.2, 9.4.7, 9.3.12, 9.2.16, and \
9.1.21. This release fixes two security issues and one index corruption issue in \
version 9.5. It also contains a variety of bug fixes for earlier versions. Users \
of PostgreSQL 9.5.0 or 9.5.1 should update as soon as possible.
This release closes security hole CVE-2016-2193, where a query plan might get \
reused for more than one ROLE in the same session. This could cause the wrong \
set of Row Level Security (RLS) policies to be used for the query.
The update also fixes CVE-2016-3065, a server crash bug triggered by using \
pageinspect with BRIN index pages. Since an attacker might be able to expose a \
few bytes of server memory, this crash is being treated as a security issue.
|
2016-03-05 12:29:49 by Jonathan Perkin | Files touched by this commit (1813) |
Log message:
Bump PKGREVISION for security/openssl ABI bump.
|
2015-06-18 16:46:14 by Adam Ciarcinski | Files touched by this commit (25) | |
Log message:
Changes:
This release primarily fixes issues not successfully fixed in prior releases. It \
should be applied as soon as possible all users of major versions 9.3 and 9.4. \
Other users should apply at the next available downtime.
Crash Recovery Fixes:
Earlier update releases attempted to fix an issue in PostgreSQL 9.3 and 9.4 with \
"multixact wraparound", but failed to account for issues doing \
multixact cleanup during crash recovery. This could cause servers to be unable \
to restart after a crash. As such, all users of 9.3 and 9.4 should apply this \
update as soon as possible.
|
2015-06-12 12:52:19 by Thomas Klausner | Files touched by this commit (3152) |
Log message:
Recursive PKGREVISION bump for all packages mentioning 'perl',
having a PKGNAME of p5-*, or depending such a package,
for perl-5.22.0.
|