Commit graph

383 commits

Author SHA1 Message Date
Palle Girgensohn
70a06c4f2e Update PostgreSQL to latest versions.
Security Fixes for Regular Expressions, PL/Java

This release closes security hole CVE-2016-0773, an issue with regular
expression (regex) parsing. Prior code allowed users to pass in expressions
which included out-of-range Unicode characters, triggering a backend crash.
This issue is critical for PostgreSQL systems with untrusted users or which
generate regexes based on user input.

The update also fixes CVE-2016-0766, a privilege escalation issue for users of
PL/Java.  Certain custom configuration settings (GUCS) for PL/Java will now be
modifiable only by the database superuser

URL:		http://www.postgresql.org/about/news/1644/
Security:	CVE-2016-0773, CVE-2016-0766
2016-02-13 22:42:04 +00:00
Palle Girgensohn
a9c901ec2b Some binaries where moved from contrib to base in 9.5, like pgbench and
pg_upgrade. Other where added in 9.5, but the port failed to install them.
Make sure they are properly installed by the correct port (-client or -server) [1]

Remove unused and hence confusing OSSP_UUID parameters from Makefile [2]

Add options to allow user to be set for the backup script in periodic.
Add this option only to 9.5 for now. It will be updated to other servers at
next regular patch release. [3]

The path to perl in hard coded into pgxs/src/Makefile.global which is
then installed. Hence, we must depend on perl when that file is installed.

Noticed by:	Paul Guyot [1]
PR:		192387 [2]
PR:		172110 [3]
PR:		206046 [4]
2016-01-13 10:36:22 +00:00
Mathieu Arnold
7f0f664d7e Drop 8 support.
With hat:	portmgr
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D3694
2015-10-15 14:55:14 +00:00
Palle Girgensohn
0642ae4b77 Update PostgreSQL port to latest version.
Two security issues have been fixed in this release which affect users
of specific PostgreSQL features:

CVE-2015-5289: json or jsonb input values constructed from arbitrary
user input can crash the PostgreSQL server and cause a denial of
service.

CVE-2015-5288: The crypt( function included with the optional pgCrypto
extension could be exploited to read a few additional bytes of memory.
No working exploit for this issue has been developed.

This update will also disable SSL renegotiation by default;
previously, it was enabled by default.   SSL renegotiation will be
removed entirely in PostgreSQL versions 9.5 and later.

URL:		http://www.postgresql.org/about/news/1615/
Security:	CVE-2015-5288 CVE-2015-5289
2015-10-08 21:25:01 +00:00
Palle Girgensohn
7d7b994589 Fix broken XML support.
PR:	ports/202649
2015-10-06 08:47:42 +00:00
Baptiste Daroussin
15a9b4d2cb Really fix ldap option 2015-07-24 06:05:22 +00:00
Baptiste Daroussin
1f9d1528bc Fix ldap option 2015-07-22 23:20:02 +00:00
Baptiste Daroussin
59f0a24756 Only defined options marked as server only for the servers
Remove (server) from the description
2015-07-22 23:10:39 +00:00
Baptiste Daroussin
4a7d808593 UNIQUENAME is not used anymore for long to save options 2015-07-22 22:56:56 +00:00
Baptiste Daroussin
bc46027203 Simplify a bit the Makefiles
Use OPTIONS_SUB to automatically PLIST_SUB
Use OPTIONS helpers
2015-07-22 22:45:35 +00:00
Baptiste Daroussin
ab7ead91d4 Cleanup plist and avoid useless @exec 2015-07-22 21:46:27 +00:00
Palle Girgensohn
07d4926020 Update PostgreSQL to latest versions.
Earlier update releases attempted to fix an issue in PostgreSQL 9.3 and 9.4
with "multixact wraparound", but failed to account for issues doing multixact
cleanup during crash recovery. This could cause servers to be unable to restart
after a crash. As such, all users of 9.3 and 9.4 should apply this update as
soon as possible.

URL:	http://www.postgresql.org/about/news/1592/
2015-06-12 13:00:49 +00:00
Palle Girgensohn
5e8dafff53 Update PostgreSQL to latest versions.
The update is mostly to fix the file persmission problem described
in the URL below. You might want to wait until next upgrade, depending
on you local configuration.
URL:	http://www.postgresql.org/about/news/1590/
2015-06-05 14:57:29 +00:00
Palle Girgensohn
89f2bb6e59 Update PostgreSQL ports to latest version.
Data Corruption Fix

For users of PostgreSQL versions 9.3 or 9.4, this release fixes a problem where
the database will fail to protect against "multixact wraparound", resulting in
data corruption or loss. Users with a high transaction rate (1 million or more
per hour) in a database with many foreign keys are especially vulnerable. We
strongly urge all users of 9.4 and 9.3 to update their installations in the
next few days.

Users of versions 9.2 and earlier are not affected by this issue.

Security:	fc38cd83-00b3-11e5-8ebd-0026551a22dc
2015-05-22 23:22:19 +00:00
Mathieu Arnold
60d1a83c2a MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
2015-05-14 10:15:04 +00:00
Palle Girgensohn
e027c898c2 Commit the missing part of last commit: Chase upcoming update of ICU to 5.5. 2015-04-19 11:12:21 +00:00
Palle Girgensohn
68916dd375 Chase upcoming update of ICU to 5.5. 2015-04-18 12:37:22 +00:00
Palle Girgensohn
b6d78357da remove redundant cpe markers on the slave ports 2015-04-05 09:00:59 +00:00
John Marino
8f3cf904a9 databases category: Remove $PTHREAD_LIBS
Note: virtuoso did not pass check-plist from before, so it was fixed.

approved by:	PTHREAD blanket
2015-03-25 09:33:52 +00:00
Bartek Rutkowski
8d240871de databases/postgresql92-server: add CPE information
- Maintainer's timeout (pgsql@FreeBSD.org)

PR:		197487
Submitted by:	Shun <shun.fbsd.pr@dropcut.net>
2015-03-20 08:58:14 +00:00
Palle Girgensohn
cbb709bca2 Revert the change from readline to libedit, and instead make libedit optional.
PR:	ports/197362
2015-02-07 17:05:07 +00:00
Palle Girgensohn
262af710e7 Update PostgreSQL-9.x to latests versions.
This update fixes multiple security issues reported in PostgreSQL over the past
few months. All of these issues require prior authentication, and some require
additional conditions, and as such are not considered generally urgent.
However, users should examine the list of security holes patched below in case
they are particularly vulnerable.

Security:	CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
		CVE-2015-0244,CVE-2014-8161
2015-02-05 22:54:34 +00:00
Palle Girgensohn
987b035d67 Revert r247147.
We need -pthread in LDFLAGS for threaded extensions like plv8js to work.

PR:		175783
Submitted by:	Li-Wen Hsu <lwhsu@FreeBSD.org>
2014-11-12 09:53:41 +00:00
Baptiste Daroussin
d3a9ea1e08 Turn OPTIONS_SINGLE KRB5 into an OPTIONS_RADIO like it is supposed to be
PR:		193451
Submitted by:	dmitry2004@yandex.ru
2014-09-10 13:34:53 +00:00
Chris Rees
dab15277f4 Convert pgsql ports to use USES+=pgsql
Reviewed by:	bapt
2014-08-25 17:53:26 +00:00
Marcus von Appen
a38c833874 - Unbreak builds after the lang/python27 update (r363790)
Exp-run:	192242, 192244
2014-08-02 07:01:53 +00:00
Chris Rees
421b8a5f6e Update to the latest snapshots.
uuid-ossp patch has been outdated with irrelevant changes (for us),
so massage back in.

In head of postgresql, this is handled properly, so eventually the ossp patches
can go.
2014-07-30 18:21:47 +00:00
Tijl Coosemans
37f54e0f66 net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample

databases/libgdamm:
- Drop :keepla
- USES=tar:bzip2
- Use INSTALL_TARGET=install-strip

databases/libgdamm5:
- Add INSTALL_TARGET=install-strip
- Drop --enable-static (inherited from old repocopy)

devel/anjuta x11-toolkits/py-gnome-extras:
- Drop :keepla

dns/powerdns dns/powerdns-devel:
- Convert to USES=libtool
- Add INSTALL_TARGET=install-strip
- Disable static modules
- Stop creating library symlinks with .0 suffix, not needed for dynamically
  opened modules

mail/dovecot2:
- Add USES=libtool

mail/dovecot2-pigeonhole:
- Drop CONFIGURE_TARGET (incorrect for Dragonfly)
- Add USES=libtool and INSTALL_TARGET=install-strip

math/gnumeric:
- USES=libtool tar:xz

Approved by:	portmgr (implicit, bump unstaged ports)
2014-07-24 18:34:16 +00:00
Baptiste Daroussin
407913afd9 Properly call MAKE_CMD 2014-06-24 22:34:27 +00:00
Palle Girgensohn
f319c969b6 Prepare for upcoming ICU-5.3 upgrade. 2014-06-09 21:57:43 +00:00
Niclas Zeising
39fc32e828 The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
as some drivers and utilities.

Bump portrevisions for xf86-* ports, as well as virtualbox-ose-additions due
to xserver version change.

Apart from these updates, the way shared libraries are handled has been
changed for all xorg ports, as well as libxml2 and freetype, which means
ltverhack is gone and as a consequence shared libraries have been bumped.
The plan is that this change will make library bumps less likely in the
future.
All affected ports have had their portrevisions bumped as a consequence of
this.

Fix some issues where WITH_NEW_XORG weren't detected properly on CURRENT.

Update instructions, hardware support, and more notes can be found on
https://wiki.freebsd.org/Graphics

Thanks to:	all testers, bdrewery and the FreeBSD x11@ team
exp-run by:	bdrewery [1]
PR:		ports/187602 [1]
Approved by:	portmgr (bdrewery), core (jhb)
2014-04-16 18:28:47 +00:00
Palle Girgensohn
9b588a49ff Fix mistake with ossp-uuid: don't use --with-ossp-uuid, since it will need
the ossp library present, and then we never use it.
2014-03-21 08:15:26 +00:00
Palle Girgensohn
2ff65cdb88 Fixed bad filesize in distinfo 2014-03-20 23:09:05 +00:00
Palle Girgensohn
4082f0b6db The PostgreSQL Global Development Group has released an update to all supported
version of the database system, including versions 9.3.4, 9.2.8, 9.1.13,
9.0.17, and 8.4.21. This minor release fixes a data corruption issue with
replication and crash recovery in version 9.3, as well as several other minor
issues in all versions.  All users of version 9.3 are urged to update their
installations at the next possible downtime.  Users of older versions should
update at their convenience.

The data corruption issue in PostgreSQL 9.3 affects binary replication
standbys, servers being recovered from point-in-time-recovery backup, and
standalone servers which recover from a system crash. The bug causes
unrecoverable index corruption during recovery due to incorrect replay of row
locking operations.  This can then cause query results to be inconsistent
depending on whether or not an index is used, and eventually lead to primary
key violations and similar issues.  For this reason, users are encouraged to
replace each of their standby databases with a new base backup after applying
the update.

See release notes for more changes.

URL:	http://www.postgresql.org/docs/current/static/release.html
URL:	https://wiki.postgresql.org/wiki/20140320UpdateIssues

A change specific to the FreeBSD port:
Modify the contrib/uuid-ossp to actually work (not crashing the backend) by
using the libc implementation of uuid instead of the ossp port. Schemas and
queries will just work. Based on the work of Andrew Gierth. 9.1+ EXTENSION
support added by girgen@.

URL:	http://pgfoundry.org/projects/uuid-freebsd
PR:	ports/121745, ports/182846
2014-03-20 13:43:15 +00:00
Antoine Brodin
4d4db2684b Stage support
Reviewed by:	postgresql@
Tested by:	miwi and me
2014-02-26 17:24:35 +00:00
Palle Girgensohn
86dd060cb0 The PostgreSQL Global Development Group has released an important
update to all supported versions of the PostgreSQL database system,
which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and
8.4.20. This update contains fixes for multiple security issues, as
well as several fixes for replication and data integrity issues.  All
users are urged to update their installations at the earliest
opportunity, especially those using binary replication or running a
high-security application.

This update fixes CVE-2014-0060, in which PostgreSQL did not properly
enforce the WITH ADMIN OPTION permission for ROLE management. Before
this fix, any member of a ROLE was able to grant others access to the
same ROLE regardless if the member was given the WITH ADMIN OPTION
permission. It also fixes multiple privilege escalation issues,
including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064,
CVE-2014-0065, and CVE-2014-0066. More information on these issues can
be found on our security page and the security issue detail wiki page.

Security:	CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063
		CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067
2014-02-20 18:11:37 +00:00
Palle Girgensohn
2ef4318584 fix messed up file sizes for icu patch 2014-02-10 23:46:46 +00:00
Palle Girgensohn
2999fc98f0 Chase ICU update 2014-02-10 16:32:40 +00:00
Baptiste Daroussin
4650a910d0 Chase boost and icu bump
While here convert some LIB_DEPENDS
2014-02-07 11:44:08 +00:00
Baptiste Daroussin
b5482324dc In preparation for making libtool generate libraries with a sane name, fix all
LIB_DEPENDS in databases
2013-12-11 18:08:52 +00:00
Palle Girgensohn
6030e71fcc The PostgreSQL Global Development Group has released a critical update
to all supported versions of the PostgreSQL database system, which
includes minor versions 9.3.2, 9.2.6, 9.1.11, 9.0.15, and 8.4.19. This
update fixes three serious data-loss bugs affecting replication and
database maintenance.  All users are urged to update their
installations at the earliest opportunity.

URL:	http://www.postgresql.org/about/news/1492/
2013-12-05 15:59:53 +00:00
Sunpoet Po-Chuan Hsieh
32da06605f - Fix PLIST for python3
Submitted by:	sunpoet (myself)
Approved by:	crees (pgsql)
2013-10-28 18:52:22 +00:00
Sunpoet Po-Chuan Hsieh
1e4b76852c - Remove DISTV: only used in PKGNAMESUFFIX and complained by portlint
- Convert to new LIB_DEPENDS format for postgresql*-contrib

Submitted by:	sunpoet (myself)
Reviewed by:	crees (pgsql)
Approved by:	jgh (pgsql)
2013-10-15 17:17:05 +00:00
Palle Girgensohn
69b65670f9 Update PostgreSQL ports to 9.3.1, 9.2.5, 9.1.10, 9.0.14, and 8.4.18.
Note that users of the hstore extension on version 9.3 must take an additional,
post upgrade step of running "ALTER EXTENSION hstore UPDATE" in each database
after update.

URL:	http://www.postgresql.org/about/news/1487/
2013-10-12 00:59:50 +00:00
Jason Helfman
284d8b8683 - Fix pkg name collision
Reviewed by: pgsql@
With hat: pgsql@
2013-10-10 00:09:35 +00:00
Jason Helfman
de278bfdf7 - revert r329725
Reported by: qat@
With hat: pgsql@
2013-10-07 20:03:38 +00:00
Jason Helfman
51bc2ff685 - Fix pkg name collision
Reviewed by: crees@
With hat: pgsql@
2013-10-07 19:04:04 +00:00
Baptiste Daroussin
36117d7097 Add NO_STAGE all over the place in preparation for the staging support (cat: databases) 2013-09-20 16:13:47 +00:00
Jason Helfman
abd1752ca4 - convert from USE_GMAKE to USES=gmake
- trim historical headers

With hat: pgsql@
2013-07-07 00:15:47 +00:00
Palle Girgensohn
45704cebea Update postgresql93-client to properly depend on pkgconfig
Reported by: Ports-QAT
2013-05-12 21:09:38 +00:00