Package Release Info

postgresql96-9.6.17-bp152.1.8

Update Info: Base Release
Available in Package Hub : 15 SP2

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

postgresql96
postgresql96-contrib
postgresql96-docs
postgresql96-plperl
postgresql96-plpython
postgresql96-pltcl
postgresql96-server
postgresql96-test

Change Logs

Version: 9.6.17-bp152.1.5
* Sat Feb 15 2020 Marcus Rueckert <mrueckert@suse.de>
- update to 9.6.17 (CVE-2020-1720)
  https://www.postgresql.org/about/news/2011/
  https://www.postgresql.org/docs/9.6/release-9-6-17.html
* Sun Dec 29 2019 Lars Vogdt <lars@linux-schulserver.de>
- use and package the sha256 checksum for for source
* Fri Dec 20 2019 Marcus Rueckert <mrueckert@suse.de>
- update to 9.6.16:
  https://www.postgresql.org/about/news/1994/
  https://www.postgresql.org/docs/9.6/release-9-6-16.html
* Tue Oct 22 2019 Marcus Rueckert <mrueckert@suse.de>
- add requires to the devel package for the libs that are returned
  by pg_config --libs
* Mon Aug 12 2019 Reinhard Max <max@suse.com>
- Update to 9.6.15:
  * https://www.postgresql.org/about/news/1960/
  * https://www.postgresql.org/docs/9.6/release-9-6-15.html
  * CVE-2019-10208, bsc#1145092: TYPE in pg_temp executes arbitrary
    SQL during SECURITY DEFINER execution.
* Fri Aug 02 2019 Martin Li?ka <mliska@suse.cz>
- Use FAT LTO objects in order to provide proper static library.
* Fri Jun 21 2019 Marcus Rueckert <mrueckert@suse.de>
- Update to 9.6.14:
  https://www.postgresql.org/docs/9.6/release-9-6-14.html
* Fri May 10 2019 Reinhard Max <max@suse.com>
- Update to 9.6.13:
  * https://www.postgresql.org/docs/9.6/release-9-6-13.html
  * https://www.postgresql.org/about/news/1939/
  * CVE-2019-10130, bsc#1134689: Prevent row-level security
    policies from being bypassed via selectivity estimators.
* Tue Mar 05 2019 Reinhard Max <max@suse.com>
- Make the server-devel package exclusive across versions.
* Mon Feb 25 2019 Reinhard Max <max@suse.com>
- Update to 9.6.12:
  * https://www.postgresql.org/docs/9.6/release-9-6-12.html
  * https://www.postgresql.org/about/news/1920/
  * By default, panic instead of retrying after fsync() failure,
    to avoid possible data corruption.
  * Numerous other bug fixes.
- Overhaul README.SUSE
* Fri Nov 09 2018 Reinhard Max <max@suse.com>
- Update to 9.6.11:
  * Numerous bug fixes, see the release notes:
    https://www.postgresql.org/docs/9.6/release-9-6-11.html
  * Remove unneeded library dependencies from PGXS.
* Wed Oct 17 2018 Marcus Rueckert <mrueckert@suse.de>
- add provides for the new server-devel package that will be
  introduced in postgresql 11
* Fri Aug 10 2018 max@suse.com
- Update to 9.6.10:
  https://www.postgresql.org/docs/current/static/release-9-6-10.html
  * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state
    fully between connection attempts.
  * CVE-2018-10925, bsc#1104202: Fix INSERT ... ON CONFLICT UPDATE
    through a view that isn't just SELECT * FROM ...
* Wed May 16 2018 max@suse.com
- Update to 9.6.9:
  https://www.postgresql.org/about/news/1851/
  https://www.postgresql.org/docs/current/static/release-9-6-9.html
  A dump/restore is not required for those running 9.6.X.
  However, if you use the adminpack extension, you should update
  it as per the first changelog entry below.
  Also, if the function marking mistakes mentioned in the second
  and third changelog entries below affect you, you will want to
  take steps to correct your database catalogs.
  * CVE-2018-1115, bsc#1091610: Remove public execute privilege
    from contrib/adminpack's pg_logfile_rotate() function
    pg_logfile_rotate() is a deprecated wrapper for the core
    function pg_rotate_logfile(). When that function was changed
    to rely on SQL privileges for access control rather than a
    hard-coded superuser check, pg_logfile_rotate() should have
    been updated as well, but the need for this was missed. Hence,
    if adminpack is installed, any user could request a logfile
    rotation, creating a minor security issue.
    After installing this update, administrators should update
    adminpack by performing ALTER EXTENSION adminpack UPDATE in
    each database in which adminpack is installed.
  * Fix incorrect volatility markings on a few built-in functions
  * Fix incorrect parallel-safety markings on a few built-in
    functions.