Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 23 Apr 2007 16:10:54 +0000 (UTC)
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/databases/postgresql73-server Makefile distinfo ports/databases/postgresql74-server Makefile distinfo ports/databases/postgresql80-server Makefile distinfo pkg-plist-server ports/databases/postgresql81-server Makefile ...
Message-ID:  <200704231610.l3NGAsDD078638@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
girgen      2007-04-23 16:10:54 UTC

  FreeBSD ports repository

  Modified files:
    databases/postgresql73-server Makefile distinfo 
    databases/postgresql74-server Makefile distinfo 
    databases/postgresql80-server Makefile distinfo 
                                  pkg-plist-server 
    databases/postgresql81-server Makefile distinfo 
                                  pkg-plist-server 
    databases/postgresql82-server Makefile distinfo 
                                  pkg-plist-server 
  Log:
  Update PostgreSQL to 7.3.19, 7.4.17, 8.0.13, 8.1.9 and 8.2.4 respectively:
  
   The PostgreSQL Global Development Group has released updated versions
   for PostgreSQL 8.2 and all back versions to patch a privilege
   escalation exploit in SECURITY DEFINER functions.  All users of this
   feature are urged to update to the latest minor version and follow
   instructions on securing these functions as soon as possible.  This
   minor release also contains other fixes, so all users should plan to
   deploy it.
  
   Once you have updated, additional steps are required to secure your
   database against the exploit.  Please read the release notes at
   http://www.postgresql.org/docs/8.2/static/release.html and the
   TechDocs article at http://www.postgresql.org/docs/techdocs.77 on how
   to lock down your security definer functions, if you use them.
  
   As always, application of a minor release does not require a dump and
   reload of the database.
  
   The frequency of security fixes recently is a result of increased
   scrutiny of the PostgreSQL code by government agencies and
   security-conscious companies.  Rapid turnaround on security patches
   is key to keeping PostgreSQL the most secure SQL database.  Your work
   and vigilance in applying the latest security updates ensures that
   there will never be a PostgreSQL "worm".
  
  http://www.postgresql.org/docs/8.2/static/release-8-2-4.html
  http://www.postgresql.org/docs/8.1/static/release.html#RELEASE-8-1-9
  http://www.postgresql.org/docs/8.0/static/release.html#RELEASE-8-0-13
  http://www.postgresql.org/docs/7.4/static/release.html#RELEASE-7-4-17
  
  http://www.postgresql.org/docs/techdocs.77
  
  Security: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2138
  
  Revision  Changes    Path
  1.148     +1 -1      ports/databases/postgresql73-server/Makefile
  1.47      +12 -12    ports/databases/postgresql73-server/distinfo
  1.150     +16 -4     ports/databases/postgresql74-server/Makefile
  1.47      +12 -12    ports/databases/postgresql74-server/distinfo
  1.164     +1 -1      ports/databases/postgresql80-server/Makefile
  1.57      +12 -12    ports/databases/postgresql80-server/distinfo
  1.9       +463 -457  ports/databases/postgresql80-server/pkg-plist-server
  1.165     +1 -1      ports/databases/postgresql81-server/Makefile
  1.55      +12 -12    ports/databases/postgresql81-server/distinfo
  1.9       +6 -0      ports/databases/postgresql81-server/pkg-plist-server
  1.168     +1 -1      ports/databases/postgresql82-server/Makefile
  1.55      +12 -12    ports/databases/postgresql82-server/distinfo
  1.9       +6 -0      ports/databases/postgresql82-server/pkg-plist-server



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200704231610.l3NGAsDD078638>