Change logs for postgresql-10 source package in Disco

  • postgresql-10 (10.5-1ubuntu3) disco; urgency=medium
    
      * Drop mangling of files in debian/libpq-dev that isn't built.
      * Build-depend on libpq-dev and libecpg-dev to find symbols.
    
     -- Adam Conrad <email address hidden>  Wed, 14 Nov 2018 14:22:31 -0700
  • postgresql-10 (10.5-1ubuntu2) disco; urgency=medium
    
      * Drop --fail-missing from dh_install calls due to previous upload.
    
     -- Adam Conrad <email address hidden>  Wed, 14 Nov 2018 13:07:54 -0700
  • postgresql-10 (10.5-1ubuntu1) disco; urgency=medium
    
      * Don't build the libraries to smooth ICU and psql transitions.
    
     -- Adam Conrad <email address hidden>  Wed, 14 Nov 2018 12:33:07 -0700
  • postgresql-10 (10.5-1build3) disco; urgency=medium
    
      * No-change rebuild for icu soname changes.
    
     -- Matthias Klose <email address hidden>  Tue, 13 Nov 2018 08:17:13 +0000
  • postgresql-10 (10.5-1build2) disco; urgency=medium
    
      * No-change rebuild for the perl 5.28 transition.
    
     -- Adam Conrad <email address hidden>  Fri, 02 Nov 2018 18:14:47 -0600
  • postgresql-10 (10.5-1build1) disco; urgency=medium
    
      * No-change rebuild to build for python3.7 as the default.
    
     -- Matthias Klose <email address hidden>  Wed, 31 Oct 2018 12:36:22 +0000
  • postgresql-10 (10.5-1) unstable; urgency=medium
    
      * New upstream version.
        + Fix failure to reset libpq's state fully between connection attempts
    
          An unprivileged user of dblink or postgres_fdw could bypass the checks
          intended to prevent use of server-side credentials, such as a ~/.pgpass
          file owned by the operating-system user running the server.  Servers
          allowing peer authentication on local connections are particularly
          vulnerable.  Other attacks such as SQL injection into a postgres_fdw
          session are also possible. Attacking postgres_fdw in this way requires
          the ability to create a foreign server object with selected connection
          parameters, but any user with access to dblink could exploit the
          problem. In general, an attacker with the ability to select the
          connection parameters for a libpq-using application could cause
          mischief, though other plausible attack scenarios are harder to think
          of. Our thanks to Andrew Krasichkov for reporting this issue.
          (CVE-2018-10915)
    
        + Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT
          FROM ...
    
          Erroneous expansion of an updatable view could lead to crashes or
          attribute ... has the wrong type errors, if the view's SELECT list
          doesn't match one-to-one with the underlying table's columns.
          Furthermore, this bug could be leveraged to allow updates of columns
          that an attacking user lacks UPDATE privilege for, if that user has
          INSERT and UPDATE privileges for some other column(s) of the table. Any
          user could also use it for disclosure of server memory. (CVE-2018-10925)
    
      * Remove version checking for libselinux1-dev, 2.1.10 is old enough now.
      * Drop support for tcl8.5.
      * Use dh_auto_configure to correctly seed the build architecture.
      * Filter -fdebug-prefix-map and -ffile-prefix-map in more places, and make
        PGXS modules build reproducibly.
      * Add new pgtypes header and symbol.
    
     -- Christoph Berg <email address hidden>  Tue, 07 Aug 2018 10:56:16 +0200