summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-support/postgresql/files
Commit message (Collapse)AuthorAgeFilesLines
* postgresql: Security Advisory-postgresql-CVE-2016-0766Zhixiong Chi2016-04-171-0/+35
| | | | | | | | | | | | add CVE-2016-0766 patch for avoiding attackers to gain privileges via unspecified vectors. Patch comes from: http://git.postgresql.org/gitweb/?p=postgresql.git;a=summary commit f4aa3a18a20d51575562520754aa376b3b08b2d0 Signed-off-by: Zhixiong Chi <Zhixiong.Chi@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* postgresql: advance from 9.4.2 to 9.4.4Joe Slater2015-07-303-12/+47
| | | | | | | | Consolidate patches in one directory and remove two unused patches. Signed-off-by: Joe Slater <jslater@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: upgrade to 9.4.2Roy Li2015-06-237-3160/+0
| | | | | | | | | | | | 1. remove Backport patches 2. Update the checksume, include CopyRight file, since date in it is changed 3. remove --without-krb5 configure options, since it become useless 4. Update remove.autoconf.version.check.patch 5. skip to check libperl Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0065 and CVE-2014-0066 Security AdvisoryKang Kai2014-11-071-0/+393
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Coverity identified a number of places in which it couldn't prove that a string being copied into a fixed-size buffer would fit. We believe that most, perhaps all of these are in fact safe, or are copying data that is coming from a trusted source so that any overrun is not really a security issue. Nonetheless it seems prudent to forestall any risk by using strlcpy() and similar functions. Fixes by Peter Eisentraut and Jozef Mlich based on Coverity reports. In addition, fix a potential null-pointer-dereference crash in contrib/chkpass. The crypt(3) function is defined to return NULL on failure, but chkpass.c didn't check for that before using the result. The main practical case in which this could be an issue is if libc is configured to refuse to execute unapproved hashing algorithms (e.g., "FIPS mode"). This ideally should've been a separate commit, but since it touches code adjacent to one of the buffer overrun changes, I included it in this commit to avoid last-minute merge issues. This issue was reported by Honza Horak. Security: CVE-2014-0065 for buffer overruns, CVE-2014-0066 for crypt() https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0065 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0066 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0067 Security AdvisoryKang Kai2014-11-071-0/+75
| | | | | | | | | | | | | | The make check command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0067 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0063 Security AdvisoryKang Kai2014-11-071-0/+465
| | | | | | | | | | | | | | | | Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0063 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0062 Security AdvisoryKang Kai2014-11-071-0/+1082
| | | | | | | | | | | | | | | Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0062 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0061 Security AdvisoryKang Kai2014-11-071-0/+267
| | | | | | | | | | | | | | The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0061 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0060 Security AdvisoryKang Kai2014-11-071-0/+273
| | | | | | | | | | | | | | PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0060 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add fix for CVE-2014-0064 Security AdvisoryKang Kai2014-11-071-0/+605
| | | | | | | | | | | | | | | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0064 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add systemd unit fileChong.Lu@windriver.com2014-09-261-0/+27
| | | | | | | | | Add systemd unit file for postgresql. When 'sysvinit' and 'systemd' are both in DISTRO_FEATURES, we need to prevent the init script from running via systemd. Signed-off-by: Chong Lu <Chong.Lu@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: move initdb to postgresql-setupChong.Lu@windriver.com2014-09-262-50/+75
| | | | | | | | | | We shouldn't use sysvinit init script to initialize database when use systemd as the init manager, so split initdb function to postgresql-setup. Before starting postgresql server, we can use "postgresql-setup initdb" to initialize the database cluster. Signed-off-by: Chong Lu <Chong.Lu@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql : Fix build using pkg-config for libxml-2.0.Philip Balister2014-07-221-0/+43
| | | | | | | | | | | | Use package-config instead of binconfig for libxml-2.0. The pgac_option processing is filtering the output from the xml-config programming. The pkgconfig output is good enough to use without such filtering. Signed-off-by: Philip Balister <philip@balister.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: enable some bindingsChong.Lu@windriver.com2014-05-031-0/+4
| | | | | | | | | 1. Enable pam, openssl, python, uuid, libxml, tcl, nls, libxml and perl bindings. 2. Make plperl, plpython, pltcl subpackages as dynamic in case other packages runtime depend on them. Signed-off-by: Chong Lu <Chong.Lu@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* postgresql: add init script and DESCRIPTIONChong.Lu@windriver.com2014-05-032-0/+245
| | | | | | | | | 1. Add DESCRIPTION 2. Add init script for starting up the PostgreSQL server. 3. Disable krb5 by default Signed-off-by: Chong Lu <Chong.Lu@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* move layer into meta-oe in preparation for future splitsKoen Kooi2011-03-171-0/+12
As per TSC decision Signed-off-by: Koen Kooi <koen@dominion.thruhere.net>