~paelzer/ubuntu/+source/postgresql-9.5:MRE-xenial-9.5.16

Last commit made on 2019-03-06
Get this branch:
git clone -b MRE-xenial-9.5.16 https://git.launchpad.net/~paelzer/ubuntu/+source/postgresql-9.5
Only Christian Ehrhardt  can upload to this branch. If you are Christian Ehrhardt  please log in for upload directions.

Branch merges

Branch information

Name:
MRE-xenial-9.5.16
Repository:
lp:~paelzer/ubuntu/+source/postgresql-9.5

Recent commits

f0f97ad... by Christian Ehrhardt 

changelog: fully backport compatible version string

Signed-off-by: Christian Ehrhardt <email address hidden>

1c4e3de... by Christian Ehrhardt 

changelog: clarify revert

Signed-off-by: Christian Ehrhardt <email address hidden>

97870d3... by Christian Ehrhardt 

changelog: fix wording

Signed-off-by: Christian Ehrhardt <email address hidden>

b083785... by Christian Ehrhardt 

MERGE patch

Signed-off-by: Christian Ehrhardt <email address hidden>

0d9874d... by Christian Ehrhardt 

changelog: revert Disallow setting client_min_messages higher than ERROR.

Signed-off-by: Christian Ehrhardt <email address hidden>

45fa14f... by Christian Ehrhardt 

revert Disallow setting client_min_messages higher than ERROR.

Signed-off-by: Christian Ehrhardt <email address hidden>

c46a8f3... by Christian Ehrhardt 

Merge changelog for 9.5.16

Signed-off-by: Christian Ehrhardt <email address hidden>

5e957ab... by Christian Ehrhardt 

New Upstream release 9.5.16

Signed-off-by: Christian Ehrhardt <email address hidden>

0da7d0a... by Christian Ehrhardt 

Import patches-unapplied version 9.5.14-0ubuntu0.16.04 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: eef3c5221f9dcbac7a1cf1382c78a6230992e0f4

New changelog entries:
  * New upstream release (LP: #1786938)
    - Fix failure to reset libpq's state fully between connection attempts
      .
      An unprivileged user of dblink or postgres_fdw could bypass the checks
      intended to prevent use of server-side credentials, such as a ~/.pgpass
      file owned by the operating-system user running the server. Servers
      allowing peer authentication on local connections are particularly
      vulnerable. Other attacks such as SQL injection into a postgres_fdw
      session are also possible. Attacking postgres_fdw in this way requires
      the ability to create a foreign server object with selected connection
      parameters, but any user with access to dblink could exploit the
      problem. In general, an attacker with the ability to select the
      connection parameters for a libpq-using application could cause
      mischief, though other plausible attack scenarios are harder to think
      of. Our thanks to Andrew Krasichkov for reporting this issue.
      (CVE-2018-10915)
    - Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT
      FROM ...
      .
      Erroneous expansion of an updatable view could lead to crashes or
      attribute ... has the wrong type errors, if the view's SELECT list
      doesn't match one-to-one with the underlying table's columns.
      Furthermore, this bug could be leveraged to allow updates of columns
      that an attacking user lacks UPDATE privilege for, if that user has
      INSERT and UPDATE privileges for some other column(s) of the table. Any
      user could also use it for disclosure of server memory.
      (CVE-2018-10925)
    - d/libecpg-dev.install: Add new pgtypes header.
    - d/libpgtypes3.symbols: Add new pgtypes symbol.
    - Details about these and changes can be found at
      https://www.postgresql.org/docs/9.5/static/release-9-5-14.html

eef3c52... by Christian Ehrhardt 

Import patches-unapplied version 9.5.13-0ubuntu0.16.04 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: d51b2f62dfb24302d376afd8522233aef1879659

New changelog entries:
  * New upstream release (LP: #1769888)
    - A dump/restore is not required for those running 9.5.X.
      However, if the function marking mistakes mentioned in the first
      changelog entry affect you, you will want to take steps to
      correct your database catalogs.
    - Details about changes can be found at
      https://www.postgresql.org/docs/9.5/static/release-9-5-13.html