View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/postgresql-9.3
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-08-16 13:10:02 UTC 2018-08-16
DSC file for 9.3.24-0ubuntu0.14.04

Author: Ubuntu Git Importer
Author Date: 2018-08-16 13:10:02 UTC

DSC file for 9.3.24-0ubuntu0.14.04

applied/ubuntu/trusty-security 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty...

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f10b2328274eda1be1699e2a5ac1f6d2c1a7a6ee
Unapplied parent: e87ddd8dd5c995c9cfb6275573e59bcd2ee97dcf

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

applied/ubuntu/trusty-devel 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty...

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f10b2328274eda1be1699e2a5ac1f6d2c1a7a6ee
Unapplied parent: e87ddd8dd5c995c9cfb6275573e59bcd2ee97dcf

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

ubuntu/trusty-updates 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: fee03c7fa51d81bb313f476bc64182f1b3082627

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

applied/ubuntu/trusty-updates 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty...

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-applied version 9.3.24-0ubuntu0.14.04 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: f10b2328274eda1be1699e2a5ac1f6d2c1a7a6ee
Unapplied parent: e87ddd8dd5c995c9cfb6275573e59bcd2ee97dcf

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

ubuntu/trusty-security 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: fee03c7fa51d81bb313f476bc64182f1b3082627

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

ubuntu/trusty-devel 2018-08-16 13:01:29 UTC 2018-08-16
Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Author: Christian Ehrhardt 
Author Date: 2018-08-14 12:49:12 UTC

Import patches-unapplied version 9.3.24-0ubuntu0.14.04 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: fee03c7fa51d81bb313f476bc64182f1b3082627

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and other changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-24.html

ubuntu/trusty-proposed 2018-05-24 14:14:09 UTC 2018-05-24
Import patches-unapplied version 9.3.23-0ubuntu0.14.04 to ubuntu/trusty-proposed

Author: Christian Ehrhardt 
Author Date: 2018-05-08 13:17:51 UTC

Import patches-unapplied version 9.3.23-0ubuntu0.14.04 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 58a1ed5698e171e6c1097637d8b892b891c1ead5

New changelog entries:
  * New upstream release (LP: #1769888)
    - A dump/restore is not required for those running 9.3.X.
      However, if the function marking mistakes mentioned in the first
      changelog entry affect you, you will want to take steps to
      correct your database catalogs.
    - Details about changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-23.html

applied/ubuntu/trusty-proposed 2018-05-24 14:14:09 UTC 2018-05-24
Import patches-applied version 9.3.23-0ubuntu0.14.04 to applied/ubuntu/trusty...

Author: Christian Ehrhardt 
Author Date: 2018-05-08 13:17:51 UTC

Import patches-applied version 9.3.23-0ubuntu0.14.04 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: e1f1c706f4b3e676e1e6731d727b781de60ba686
Unapplied parent: ac8608be56d6f70ffaa1e2260e632926df9998c7

New changelog entries:
  * New upstream release (LP: #1769888)
    - A dump/restore is not required for those running 9.3.X.
      However, if the function marking mistakes mentioned in the first
      changelog entry affect you, you will want to take steps to
      correct your database catalogs.
    - Details about changes can be found at
      https://www.postgresql.org/docs/9.3/static/release-9-3-23.html

importer/ubuntu/pristine-tar 2018-04-03 19:13:29 UTC 2018-04-03
pristine-tar data for postgresql-9.3_9.3.22.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-04-03 19:13:29 UTC

pristine-tar data for postgresql-9.3_9.3.22.orig.tar.gz

importer/debian/dsc 2018-04-03 16:55:53 UTC 2018-04-03
DSC file for 9.3.4-2

Author: Ubuntu Git Importer
Author Date: 2018-04-03 16:55:53 UTC

DSC file for 9.3.4-2

importer/debian/pristine-tar 2018-04-03 16:13:40 UTC 2018-04-03
Initial Debian pristine-tar branch.

Author: Ubuntu Git Importer
Author Date: 2018-04-03 16:13:40 UTC

Initial Debian pristine-tar branch.

ubuntu/devel 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: af777adbf23a7e077eca3152e4a7a336b6a68b64

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

ubuntu/utopic-proposed 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: af777adbf23a7e077eca3152e4a7a336b6a68b64

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

applied/ubuntu/utopic 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: b85ae92dc87fefa9702f04bd69f3fa325630b66a
Unapplied parent: 5feebb2464f3ef5d6f1d8bdbe283bea516103924

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

applied/ubuntu/utopic-devel 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: b85ae92dc87fefa9702f04bd69f3fa325630b66a
Unapplied parent: 5feebb2464f3ef5d6f1d8bdbe283bea516103924

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

applied/ubuntu/utopic-proposed 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: b85ae92dc87fefa9702f04bd69f3fa325630b66a
Unapplied parent: 5feebb2464f3ef5d6f1d8bdbe283bea516103924

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

ubuntu/utopic-devel 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: af777adbf23a7e077eca3152e4a7a336b6a68b64

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

applied/ubuntu/devel 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-applied version 9.3.5-0ubuntu1 to applied/ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: b85ae92dc87fefa9702f04bd69f3fa325630b66a
Unapplied parent: 5feebb2464f3ef5d6f1d8bdbe283bea516103924

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

ubuntu/utopic 2014-07-24 14:08:45 UTC 2014-07-24
Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Author: Martin Pitt
Author Date: 2014-07-24 13:14:05 UTC

Import patches-unapplied version 9.3.5-0ubuntu1 to ubuntu/utopic-proposed

Imported using git-ubuntu import.

Changelog parent: af777adbf23a7e077eca3152e4a7a336b6a68b64

New changelog entries:
  [ Christoph Berg ]
  * New upstream release. (LP: #1348176)
    + Secure Unix-domain sockets of temporary postmasters started during make
      check (Noah Misch)
      Any local user able to access the socket file could connect as the
      server's bootstrap superuser, then proceed to execute arbitrary code as
      the operating-system user running the test, as we previously noted in
      CVE-2014-0067. This change defends against that risk by placing the
      server's socket in a temporary, mode 0700 subdirectory of /tmp.
  * Remove our pg_regress patches to support --host=/path.
  * Remove the tcl8.6 patch, went upstream.
  * Update Vcs URLs.

debian/sid 2014-05-30 16:20:13 UTC 2014-05-30
Import patches-unapplied version 9.3.4-2 to debian/sid

Author: Christoph Berg
Author Date: 2014-05-29 18:17:07 UTC

Import patches-unapplied version 9.3.4-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 4365cf0be5d60611c4e2890a20ec9a803aa32afb

New changelog entries:
  * Bump to debhelper 9 to get debug symbol files based on build-ids.
  * Enable multiarch support in libpq and friends. (Closes: #706849)
    Support is automatically disabled when the distribution does not support
    it.
  * Stop providing/replacing/conflicting with postgresql*-dbg.
  * Skip -pie on 32bit archs for performance and stability reasons.
    Closes: #749686; details at
    http://www.postgresql.org/message-id/20140519115318.GB7296@msgid.df7cb.de

applied/debian/jessie 2014-05-30 16:20:13 UTC 2014-05-30
Import patches-applied version 9.3.4-2 to applied/debian/sid

Author: Christoph Berg
Author Date: 2014-05-29 18:17:07 UTC

Import patches-applied version 9.3.4-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9736a17c15b3b9992ea302fa9ebb17ac818aa57d
Unapplied parent: b77d70f1aed09fc25911ca1af09fe7a471d265c2

New changelog entries:
  * Bump to debhelper 9 to get debug symbol files based on build-ids.
  * Enable multiarch support in libpq and friends. (Closes: #706849)
    Support is automatically disabled when the distribution does not support
    it.
  * Stop providing/replacing/conflicting with postgresql*-dbg.
  * Skip -pie on 32bit archs for performance and stability reasons.
    Closes: #749686; details at
    http://www.postgresql.org/message-id/20140519115318.GB7296@msgid.df7cb.de

applied/debian/sid 2014-05-30 16:20:13 UTC 2014-05-30
Import patches-applied version 9.3.4-2 to applied/debian/sid

Author: Christoph Berg
Author Date: 2014-05-29 18:17:07 UTC

Import patches-applied version 9.3.4-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 9736a17c15b3b9992ea302fa9ebb17ac818aa57d
Unapplied parent: b77d70f1aed09fc25911ca1af09fe7a471d265c2

New changelog entries:
  * Bump to debhelper 9 to get debug symbol files based on build-ids.
  * Enable multiarch support in libpq and friends. (Closes: #706849)
    Support is automatically disabled when the distribution does not support
    it.
  * Stop providing/replacing/conflicting with postgresql*-dbg.
  * Skip -pie on 32bit archs for performance and stability reasons.
    Closes: #749686; details at
    http://www.postgresql.org/message-id/20140519115318.GB7296@msgid.df7cb.de

debian/jessie 2014-05-30 16:20:13 UTC 2014-05-30
Import patches-unapplied version 9.3.4-2 to debian/sid

Author: Christoph Berg
Author Date: 2014-05-29 18:17:07 UTC

Import patches-unapplied version 9.3.4-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 4365cf0be5d60611c4e2890a20ec9a803aa32afb

New changelog entries:
  * Bump to debhelper 9 to get debug symbol files based on build-ids.
  * Enable multiarch support in libpq and friends. (Closes: #706849)
    Support is automatically disabled when the distribution does not support
    it.
  * Stop providing/replacing/conflicting with postgresql*-dbg.
  * Skip -pie on 32bit archs for performance and stability reasons.
    Closes: #749686; details at
    http://www.postgresql.org/message-id/20140519115318.GB7296@msgid.df7cb.de

ubuntu/trusty 2014-03-20 22:22:32 UTC 2014-03-20
Import patches-unapplied version 9.3.4-1 to debian/sid

Author: Christoph Berg
Author Date: 2014-03-18 06:19:37 UTC

Import patches-unapplied version 9.3.4-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 025f7fdb76576052b0d1df51f35c225b3b5e4ef8

New changelog entries:
  * New upstream bugfix release. Most notable change:
    Fix WAL replay of locking an already-updated tuple (Andres Freund,
    Álvaro Herrera)
    This error caused updated rows to not be found by index scans, resulting
    in inconsistent query results depending on whether an index scan was used.
    Subsequent processing could result in constraint violations, since the
    previously updated row would not be found by later index searches, thus
    possibly allowing conflicting rows to be inserted. Since this error is in
    WAL replay, it would only manifest during crash recovery or on standby
    servers. The improperly-replayed case most commonly arises when a table
    row that is referenced by a foreign-key constraint is updated concurrently
    with creation of a referencing row.
  * Compile with -fno-omit-frame-pointer on amd64 to facilitate hierarchical
    profile generation. (Closes: #730134)
  * Remove obsolete configure option --with-tkconfig.

applied/ubuntu/trusty 2014-03-20 22:22:32 UTC 2014-03-20
Import patches-applied version 9.3.4-1 to applied/debian/sid

Author: Christoph Berg
Author Date: 2014-03-18 06:19:37 UTC

Import patches-applied version 9.3.4-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: e57bf0c9fabde419a78f4431e206af996194f701
Unapplied parent: 6a8f165f6fe9dc18e02e75994210c01d35d5e552

New changelog entries:
  * New upstream bugfix release. Most notable change:
    Fix WAL replay of locking an already-updated tuple (Andres Freund,
    Álvaro Herrera)
    This error caused updated rows to not be found by index scans, resulting
    in inconsistent query results depending on whether an index scan was used.
    Subsequent processing could result in constraint violations, since the
    previously updated row would not be found by later index searches, thus
    possibly allowing conflicting rows to be inserted. Since this error is in
    WAL replay, it would only manifest during crash recovery or on standby
    servers. The improperly-replayed case most commonly arises when a table
    row that is referenced by a foreign-key constraint is updated concurrently
    with creation of a referencing row.
  * Compile with -fno-omit-frame-pointer on amd64 to facilitate hierarchical
    profile generation. (Closes: #730134)
  * Remove obsolete configure option --with-tkconfig.

applied/debian/experimental 2013-06-28 16:10:32 UTC 2013-06-28
Import patches-applied version 9.3~beta2-2 to applied/debian/experimental

Author: Martin Pitt
Author Date: 2013-06-28 12:37:06 UTC

Import patches-applied version 9.3~beta2-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 40210852c32904b10e50295cd64f72f48b8472e4
Unapplied parent: 912b8ffbebf04d951f8464d31741031a1a013417

New changelog entries:
  * debian/postgresql-9.3.preinst: Abort upgrade if there are still clusters
    with the 9.3beta1 format, these need to be dumped/dropped first.
    (Closes: #714328)

debian/experimental 2013-06-28 16:10:32 UTC 2013-06-28
Import patches-unapplied version 9.3~beta2-2 to debian/experimental

Author: Martin Pitt
Author Date: 2013-06-28 12:37:06 UTC

Import patches-unapplied version 9.3~beta2-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 8a251ff33e3d7ac47be748e0c2f250e4848b4428

New changelog entries:
  * debian/postgresql-9.3.preinst: Abort upgrade if there are still clusters
    with the 9.3beta1 format, these need to be dumped/dropped first.
    (Closes: #714328)

128 of 28 results

Other repositories

Name Last Modified
lp:ubuntu/+source/postgresql-9.3 2018-08-16
lp:~paelzer/ubuntu/+source/postgresql-9.3 2018-08-14
12 of 2 results
You can't create new repositories for postgresql-9.3 in Ubuntu.