Next | Query returned 53 messages, browsing 41 to 50 | Previous

History of commit frequency

CVS Commit History:


   2021-07-12 11:06:22 by Michael van Elst | Files touched by this commit (8)
Log message:
Add backends order dependency for catalog -> utils
   2021-06-13 10:56:27 by Nia Alarie | Files touched by this commit (5)
Log message:
postgres*: detect NetBSD/sparc correctly
   2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575)
Log message:
*: recursive bump for perl 5.34
   2021-05-18 13:56:23 by Adam Ciarcinski | Files touched by this commit (65) | Package updated
Log message:
postgresql: updated to 13.3, 12.7, 11.12, 10.17, 9.6.22

PostgreSQL 13.3, 12.7, 11.12, 10.17, and 9.6.22 Released!

Posted on 2021-05-13 by PostgreSQL Global Development Group
 PostgreSQL Project  Security
The PostgreSQL Global Development Group has released an update to all supported \ 
versions of our database system, including 13.3, 12.7, 11.12, 10.17, and 9.6.22. \ 
This release closes three security vulnerabilities and fixes over 45 bugs \ 
reported over the last three months.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-32027: Buffer overrun from integer overflow in array subscripting \ 
calculations

Versions Affected: 9.6 - 13. The security team typically does not test \ 
unsupported versions, but this problem is quite old.

While modifying certain SQL array values, missing bounds checks let \ 
authenticated database users write arbitrary bytes to a wide area of server \ 
memory.

The PostgreSQL project thanks Tom Lane for reporting this problem.

CVE-2021-32028: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

Versions Affected: 9.6 - 13. The security team typically does not test \ 
unsupported versions. The feature first appeared in 9.5.

Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted \ 
table, an attacker can read arbitrary bytes of server memory. In the default \ 
configuration, any authenticated database user can create prerequisite objects \ 
and complete this attack at will. A user lacking the CREATE and TEMPORARY \ 
privileges on all databases and the CREATE privilege on all schemas cannot use \ 
this attack at will.

The PostgreSQL project thanks Andres Freund for reporting this problem.

CVE-2021-32029: Memory disclosure in partitioned-table UPDATE ... RETURNING

Versions Affected: 11 - 13

Using an UPDATE ... RETURNING on a purpose-crafted partitioned table, an \ 
attacker can read arbitrary bytes of server memory. In the default \ 
configuration, any authenticated database user can create prerequisite objects \ 
and complete this attack at will. A user lacking the CREATE and TEMPORARY \ 
privileges on all databases and the CREATE privilege on all schemas typically \ 
cannot use this attack at will.

The PostgreSQL project thanks Tom Lane for reporting this problem.

Bug Fixes and Improvements

This update fixes over 45 bugs that were reported in the last several months. \ 
Some of these issues only affect version 13, but could also apply to other \ 
supported versions.

Some of these fixes include:

Fix potential incorrect computation of UPDATE ... RETURNING outputs for joined, \ 
cross-partition updates.
Fix ALTER TABLE ... ALTER CONSTRAINT when used on foreign-key constraints on \ 
partitioned tables. The command would fail to adjust the DEFERRABLE and/or \ 
INITIALLY DEFERRED properties of the constraints and triggers of leaf \ 
partitions, leading to unexpected behavior. After updating to this version, you \ 
can execute the ALTER TABLE ... ALTER CONSTRAINT command to fix any misbehaving \ 
partitioned tables.
Ensure that when a child table is attached with ALTER TABLE ... INHERIT that \ 
generated columns in the parent are generated in the same way in the child.
Forbid marking an identity column as NULL.
Allow ALTER ROLE ... SET/ALTER DATABASE ... SET to set the role, \ 
session_authorization, and temp_buffers parameters.
Ensure that REINDEX CONCURRENTLY preserves any statistics target set for the index.
Fix an issue where, in some cases, saving records within AFTER triggers could \ 
cause crashes.
Fix how to_char() handles Roman-numeral month format codes with negative intervals.
Fix use of uninitialized value while parsing an \{m,n\} quantifier in a BRE-mode \ 
regular expression.
Fix "could not find pathkey item to sort" planner errors that occur in \ 
some situations when the sort key involves an aggregate or window function.
Fix issue with BRIN index bitmap scans that could lead to "could not open \ 
file" errors.
Fix potentially wrong answers from GIN tsvector index searches when there are \ 
many matching records.
Fixes for COMMIT AND CHAIN functionality on both the server and psql.
Avoid incorrect timeline change while recovering uncommitted two-phase \ 
transactions from WAL, which could lead to consistency issues and the inability \ 
to restart the server.
Ensure thatwal_sync_method is set to fdatasync by default on newer FreeBSD releases.
Disable the vacuum_cleanup_index_scale_factor parameter and storage option.
Fix several memory leaks in the server, including one with SSL/TLS parameter \ 
initialization.
Restore the previous behavior of \connect service=XYZ to psql, i.e. disallow \ 
environmental variables (e.g. PGPORT) from overriding entries in the service \ 
file.
Fix how pg_dump handles generated columns in partitioned tables.
Add additional checks to pg_upgrade for user tables containing non-upgradable \ 
data types.
On Windows, initdb now prints instructions about how to start the server with \ 
pg_ctl using backslash separators.
Fix pg_waldump to count XACT records correctly when generating per-record statistics.
   2021-05-07 08:58:56 by Nia Alarie | Files touched by this commit (6)
Log message:
postgresql*: explicitly mark BROKEN on Alpha

Support for Alpha was removed in 2014. This removed the spinlock and
memory barrier implementations, meaning Postgresql on Alpha no longer
compiles cleanly with the default options. According to the commit
message the code was "unlikely to currently work correctly".

Enthusiasts may wish to re-add Alpha support, but it should likely
only be done with proper testing to avoid data loss in the case someone
uses it.
   2021-04-21 13:43:04 by Adam Ciarcinski | Files touched by this commit (1822)
Log message:
revbump for textproc/icu
   2021-04-16 08:38:21 by Nia Alarie | Files touched by this commit (6)
Log message:
postgresql: ensure linux libuuid is buildlinked when needed
   2021-04-01 12:22:23 by Adam Ciarcinski | Files touched by this commit (2)
Log message:
postgresql13: PLIST fix for gssapi option turned off
   2021-03-18 16:04:56 by Adam Ciarcinski | Files touched by this commit (35)
Log message:
postgresql: fix buildling contrib/uuid-ossp; fixes for LLVM enabled; should fix \ 
#55803
   2021-02-15 19:58:42 by Adam Ciarcinski | Files touched by this commit (57) | Package updated
Log message:
postgresql: updated to 13.2, 12.6, 11.11, 10.16, 9.6.21, and 9.5.25

The PostgreSQL Global Development Group has released an update to all supported \ 
versions of our database system, including 13.2, 12.6, 11.11, 10.16, 9.6.21, and \ 
9.5.25. This release closes two security vulnerabilities and fixes over 80 bugs \ 
reported over the last three months.

Additionally, this is the final release of PostgreSQL 9.5. If you are running \ 
PostgreSQL 9.5 in a production environment, we suggest that you make plans to \ 
upgrade.

For the full list of changes, please review the release notes.

Security Issues

CVE-2021-3393: Partition constraint violation errors leak values of denied columns

Versions Affected: 11 - 13.

A user having an UPDATE privilege on a partitioned table but lacking the SELECT \ 
privilege on some column may be able to acquire denied-column values from an \ 
error message. This is similar to CVE-2014-8161, but the conditions to exploit \ 
are more rare.

The PostgreSQL project thanks Heikki Linnakangas for reporting this problem.

CVE-2021-20229: Single-column SELECT privilege enables reading all columns

Versions Affected: 13.

A user having a SELECT privilege on an individual column can craft a special \ 
query that returns all columns of the table.

Additionally, a stored view that uses column-level privileges will have \ 
incomplete column-usage bitmaps. In installations that depend on column-level \ 
permissions for security, it is recommended to execute CREATE OR REPLACE on all \ 
user-defined views to force them to be re-parsed.

The PostgreSQL project thanks Sven Klemm for reporting this problem.

Bug Fixes and Improvements

This update fixes over 80 bugs that were reported in the last several months. \ 
Some of these issues only affect version 13, but could also apply to other \ 
supported versions.

Some of these fixes include:

Fix an issue with GiST indexes where concurrent insertions could lead to a \ 
corrupt index with entries placed in the wrong pages. You should REINDEX any \ 
affected GiST indexes.
Fix CREATE INDEX CONCURRENTLY to ensure rows from concurrent prepared \ 
transactions are included in the index. Installations that have enabled prepared \ 
transactions should REINDEX any concurrently-built indexes.
Fix for possible incorrect query results when a hash aggregation is spilled to disk.
Fix edge case in incremental sort that could lead to sorting results incorrectly \ 
or a "retrieved too many tuples in a bounded sort" error.
Avoid crash when a CALL or DO statement that performs a transaction rollback is \ 
executed via extended query protocol, such as from prepared statements.
Fix a failure when a PL/pgSQL procedure used CALL on another procedure that has \ 
OUT parameters that executed a COMMIT or ROLLBACK.
Remove errors from BEFORE UPDATE triggers on partitioned tables for restrictions \ 
that no longer apply.
Several fixes for queries with joins that could lead to error messages such as \ 
"no relation entry for relid N" or "failed to build any N-way \ 
joins".
Do not consider parallel-restricted or set-returning functions in an ORDER BY \ 
expressions when trying to parallelize sorts.
Fix ALTER DEFAULT PRIVILEGES to handle duplicate arguments safely.
Several fixes in behavior when wal_level is set to minimal, including when \ 
tables are rewritten within a transaction.
Several fixes for CREATE TABLE LIKE.
Ensure that allocated disk space for a dropped relation (e.g. a table) is \ 
released promptly when a transaction is committed.
Fix progress reporting for CLUSTER.
Fix handling of backslash-escaped multibyte characters in COPY FROM.
Fix recently-introduced race conditions in LISTEN/NOTIFY queue handling.
Allow the jsonb concatenation operator (||) to handle all combinations of JSON \ 
data types.
Fix WAL-reading logic so that standbys can handle timeline switches correctly. \ 
This issue could have shown itself with errors like "requested WAL segment \ 
has already been removed".
Several leak fixes for the walsender process around logical decoding and replication.
Ensure that a nonempty value of krb_server_keyfile always overrides any setting \ 
of KRB5_KTNAME in the server environment
Several fixes for GSS encryption support.
Ensure the \connect command allows the use of a password in the \ 
connection_string argument.
Fix assorted bugs with the \help command.
Several fixes for pg_dump.
Ensure that pg_rewind accounts for all WAL when rewinding a standby server.
Fix memory leak in contrib/auto_explain.
Ensure all postgres_fdw connections are closed if the a user mapping or foreign \ 
server object those connections depend on are dropped.
Fix JIT compilation to be compatible with LLVM 11 and LLVM 12.
This update also contains tzdata release 2021a for DST law changes in Russia \ 
(Volgograd zone) and South Sudan, plus historical corrections for Australia, \ 
Bahamas, Belize, Bermuda, Ghana, Israel, Kenya, Nigeria, Palestine, Seychelles, \ 
and Vanuatu.

Notably, the Australia/Currie zone has been corrected to the point where it is \ 
identical to Australia/Hobart.

For the full list of changes available, please review the release notes.

PostgreSQL 9.5 is EOL

This is the final release of PostgreSQL 9.5. If you are running PostgreSQL 9.5 \ 
in a production environment, we suggest that you make plans to upgrade to a \ 
newer, supported version of PostgreSQL. Please see our versioning policy for \ 
more information.

Next | Query returned 53 messages, browsing 41 to 50 | Previous