<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ports/databases/postgresql13-server, branch 13.1-eol</title>
<subtitle>FreeBSD ports tree</subtitle>
<id>https://cgit-dev.freebsd.org/ports/atom?h=13.1-eol</id>
<link rel='self' href='https://cgit-dev.freebsd.org/ports/atom?h=13.1-eol'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/'/>
<updated>2023-07-05T14:11:39Z</updated>
<entry>
<title>databases/postgresql16-*: Introduce postgresql16 beta 1</title>
<updated>2023-07-05T14:11:39Z</updated>
<author>
<name>Palle Girgensohn</name>
<email>girgen@FreeBSD.org</email>
</author>
<published>2023-05-25T15:53:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=4ee225f90aa3f81a418859086a0bca660f44e7ef'/>
<id>urn:sha1:4ee225f90aa3f81a418859086a0bca660f44e7ef</id>
<content type='text'>
URL:	https://www.postgresql.org/about/news/postgresql-16-beta-1-released-2643/
Release notes:	https://www.postgresql.org/docs/16/release-16.html
</content>
</entry>
<entry>
<title>databases/postgresql??-server: update to latest version</title>
<updated>2023-05-11T15:42:57Z</updated>
<author>
<name>Palle Girgensohn</name>
<email>girgen@FreeBSD.org</email>
</author>
<published>2023-05-11T15:21:54Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=3fd6f200dc8c12022515f7c3f662df148941e261'/>
<id>urn:sha1:3fd6f200dc8c12022515f7c3f662df148941e261</id>
<content type='text'>
The PostgreSQL Global Development Group has released an update to all
supported versions of PostgreSQL, including 15.3, 14.8, 13.11, 12.15,
and 11.20. This release fixes two security vulnerabilities over 80 bugs
reported over the last several months.

CVE-2023-2454: CREATE SCHEMA ... schema_element defeats protective search_path changes.

This enabled an attacker having database-level CREATE privilege to
execute arbitrary code as the bootstrap superuser. Database owners have
that right by default, and explicit grants may extend it to other users.

CVE-2023-2455: Row security policies disregard user ID changes after inlining.

While CVE-2016-2193 fixed most interaction between row security and user
ID changes, it missed a scenario involving function inlining. This leads
to potentially incorrect policies being applied in cases where
role-specific policies are used and a given query is planned under one
role and then executed under other roles. This scenario can happen under
security definer functions or when a common user and query is planned
initially and then re-used across multiple SET ROLEs. Applying an
incorrect policy may permit a user to complete otherwise-forbidden reads
and modifications. This affects only databases that have used CREATE
POLICY to define a row security policy.

Security:	fbb5a260-f00f-11ed-bbae-6cc21735f730
Security:	4b636f50-f011-11ed-bbae-6cc21735f730
Release-notes:	https://www.postgresql.org/docs/release/
</content>
</entry>
<entry>
<title>devel/icu: update to 73.1</title>
<updated>2023-04-13T00:56:37Z</updated>
<author>
<name>Jan Beich</name>
<email>jbeich@FreeBSD.org</email>
</author>
<published>2023-03-23T17:56:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=f1f1a8be887ee2c5d75bec33cb8f8a89454e606b'/>
<id>urn:sha1:f1f1a8be887ee2c5d75bec33cb8f8a89454e606b</id>
<content type='text'>
- Temporarily switch to GitHub auto archive (release artifacts are N/A atm)

Changes:	https://github.com/unicode-org/icu/releases/tag/release-73-1
Reported by:	GitHub (watch releases)
PR:		270422
Exp-run by:	antoine
</content>
</entry>
<entry>
<title>databases/postgresql??-*: upgrade to latest versions</title>
<updated>2023-02-09T14:52:35Z</updated>
<author>
<name>Palle Girgensohn</name>
<email>girgen@FreeBSD.org</email>
</author>
<published>2023-02-09T14:48:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=8f04ac817353175e8f73e8561d404b81b9d20ce4'/>
<id>urn:sha1:8f04ac817353175e8f73e8561d404b81b9d20ce4</id>
<content type='text'>
The PostgreSQL Global Development Group has released an update to all
supported versions of PostgreSQL, including 15.2, 14.7, 13.10, 12.14,
and 11.19. This release closes one security vulnerability and fixes over
60 bugs reported over the last several months.

Release notes:	https://www.postgresql.org/docs/release/
Security:	CVE-2022-41862: Client memory disclosure when
		connecting, with Kerberos, to modified server.
</content>
</entry>
<entry>
<title>databases/postgresql*-server: require mountlate in rc.d scripts</title>
<updated>2022-11-15T15:40:59Z</updated>
<author>
<name>Dmitry Marakasov</name>
<email>amdmi3@FreeBSD.org</email>
</author>
<published>2022-05-17T10:49:50Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=d512e8cce2abc9375784bc1dc4c91d5353e867a0'/>
<id>urn:sha1:d512e8cce2abc9375784bc1dc4c91d5353e867a0</id>
<content type='text'>
PostgreSQL server may use late-mounted filesystems, so require these
in rc.d scripts. Real life example is when /tmp is late-mounted tmpfs
atop of ZFS, and if posgresql-server starts before mountlate, its
socket which resides on /tmp is hidden under tmpfs which is mounted
afterwards.

PR:		267500
Approved by:	maintainer timeout (pgsql, 2 weeks)
</content>
</entry>
<entry>
<title>databases/postgresq??-*: update to latest version</title>
<updated>2022-11-10T16:23:11Z</updated>
<author>
<name>Palle Girgensohn</name>
<email>girgen@FreeBSD.org</email>
</author>
<published>2022-11-10T16:21:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=792a1db259a1e0b8588727d5a200dc62dac54ae8'/>
<id>urn:sha1:792a1db259a1e0b8588727d5a200dc62dac54ae8</id>
<content type='text'>
PostgreSQL 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23 Released!

The PostgreSQL Global Development Group has released an update to all
supported versions of PostgreSQL, including 15.1, 14.6, 13.9, 12.13,
11.18, and 10.23. This release fixes 25 bugs reported over the last
several months.

This is the final release of PostgreSQL 10. PostgreSQL 10 will no longer
receive security and bug fixes. If you are running PostgreSQL 10 in a
production environment, we suggest that you make plans to upgrade.

Release notes:	https://www.postgresql.org/docs/release/
</content>
</entry>
<entry>
<title>devel/icu: update to 72.1</title>
<updated>2022-10-19T08:10:29Z</updated>
<author>
<name>Jan Beich</name>
<email>jbeich@FreeBSD.org</email>
</author>
<published>2022-09-24T16:35:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=dfe25d73e7fdd333c59008a4ec1859c7f93dacd6'/>
<id>urn:sha1:dfe25d73e7fdd333c59008a4ec1859c7f93dacd6</id>
<content type='text'>
Changes:	https://github.com/unicode-org/icu/releases/tag/release-72-1
Reported by:	GitHub (watch releases)
PR:		266582
Exp-run by:	antoine
</content>
</entry>
<entry>
<title>databases/postgresql??-server: fix bad PLIST substitutions</title>
<updated>2022-10-03T08:29:02Z</updated>
<author>
<name>Palle Girgensohn</name>
<email>girgen@FreeBSD.org</email>
</author>
<published>2022-10-03T08:29:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=c54eaee9b25b1e5a82d00277e2dca7ccf67c0a81'/>
<id>urn:sha1:c54eaee9b25b1e5a82d00277e2dca7ccf67c0a81</id>
<content type='text'>
Noted by:	sunpoet@
</content>
</entry>
<entry>
<title>databases/postgresql*-server: fix minor style bugs in maintenance script</title>
<updated>2022-09-14T04:10:22Z</updated>
<author>
<name>Alexey Dokuchaev</name>
<email>danfe@FreeBSD.org</email>
</author>
<published>2022-09-14T04:10:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=d06aa00bb41c25880dd99fef34b5c97704af4a33'/>
<id>urn:sha1:d06aa00bb41c25880dd99fef34b5c97704af4a33</id>
<content type='text'>
Convert to ASCII and trim EOL whitespace.  The scripts are now identical
across all PostgreSQL server versions we have in the ports.

Verified by:	cksum(1)
</content>
</entry>
<entry>
<title>Fix WWW in parent/child ports</title>
<updated>2022-09-10T17:41:16Z</updated>
<author>
<name>Tobias Kortkamp</name>
<email>tobik@FreeBSD.org</email>
</author>
<published>2022-09-10T17:41:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/ports/commit/?id=e79fe1aabc5b83364240652d62b99198a9ccfb32'/>
<id>urn:sha1:e79fe1aabc5b83364240652d62b99198a9ccfb32</id>
<content type='text'>
Many of the WWW are overwritten later which means the wrong value
is used. This did not happen before where the children were either
 a) just using the pkg-descr from the parents
 b) or had their own separate pkg-descr with custom WWW

Use WWW?= in parents when the child's WWW is different.

Children that use the same WWW as the parent can just inherit it,
i.e., the child WWW can be removed.

Approved by:	portmgr (implicit)
</content>
</entry>
</feed>
