notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: databases/postgresql91-server/files/502.pgsql.in
SVNWeb

Number of commits found XX: 4

Thu, 11 Aug 2016
[ 16:39 girgen ] Original commit   Revision:420089
420089 UPDATING
420089 databases/postgresql91-server/Makefile
420089 databases/postgresql91-server/distinfo
420089 databases/postgresql91-server/files/502.pgsql.in
420089 databases/postgresql92-server/Makefile
420089 databases/postgresql92-server/distinfo
420089 databases/postgresql92-server/files/502.pgsql.in
420089 databases/postgresql93-server/Makefile
420089 databases/postgresql93-server/distinfo
420089 databases/postgresql93-server/files/502.pgsql.in

(Only the first 10 of 16 ports in this commit are shown above. View all ports for this commit)
The PostgreSQL Global Development Group has released an update to all supported
versions of our database system, including 9.5.4, 9.4.9, 9.3.14, 9.2.18 and
9.1.23. This release fixes two security issues. It also patches a number of
other bugs reported over the last three months. Users who rely on security
isolation between database users should update as soon as possible. Other users
should plan to update at the next convenient downtime.

If you are using the ICU patch, please consult UPDATING.

Improve periodic cleanup, suggested by claudius (at) ambtec.de. [1]

PR:		210941 [1]
Security:	CVE-2016-5423, CVE-2016-5424
Sat, 13 Feb 2016
[ 22:42 girgen ] Original commit   Revision:408835
408835 databases/postgresql90-server/files/502.pgsql.in
408835 databases/postgresql91-server/Makefile
408835 databases/postgresql91-server/distinfo
408835 databases/postgresql91-server/files/502.pgsql.in
408835 databases/postgresql91-server/pkg-plist-client
408835 databases/postgresql92-server/Makefile
408835 databases/postgresql92-server/distinfo
408835 databases/postgresql92-server/files/502.pgsql.in
408835 databases/postgresql92-server/pkg-plist-client
408835 databases/postgresql93-server/Makefile

(Only the first 10 of 22 ports in this commit are shown above. View all ports for this commit)
Update PostgreSQL to latest versions.

Security Fixes for Regular Expressions, PL/Java

This release closes security hole CVE-2016-0773, an issue with regular
expression (regex) parsing. Prior code allowed users to pass in expressions
which included out-of-range Unicode characters, triggering a backend crash.
This issue is critical for PostgreSQL systems with untrusted users or which
generate regexes based on user input.

The update also fixes CVE-2016-0766, a privilege escalation issue for users of
PL/Java.  Certain custom configuration settings (GUCS) for PL/Java will now be
modifiable only by the database superuser

URL:		http://www.postgresql.org/about/news/1644/
Security:	CVE-2016-0773, CVE-2016-0766
Tue, 18 Oct 2011
[ 09:03 girgen ] Original commit 
1.201 databases/postgresql82-server/Makefile
1.70 databases/postgresql82-server/distinfo
1.11 databases/postgresql82-server/files/502.pgsql
1.1 databases/postgresql82-server/files/502.pgsql.in
1.2 databases/postgresql82-server/files/patch-src-plperl-plperl
1.5 databases/postgresql82-server/pkg-install-server
1.21 databases/postgresql82-server/pkg-plist-server
1.214 databases/postgresql83-server/Makefile
1.79 databases/postgresql83-server/distinfo
1.12 databases/postgresql83-server/files/502.pgsql

(Only the first 10 of 43 ports in this commit are shown above. View all ports for this commit)
The PostgreSQL Global Development Group today released minor version updates
for all active branches of the PostgreSQL object-relational database system,
including versions 9.1.1, 9.0.5, 8.4.9, 8.3.16 and 8.2.22.

All users are strongly urged to update their installations at the next
scheduled downtime.

URL:    http://www.postgresql.org/about/news.1355

Cleanup ports. Better handling of the knob PG_USER.
Also add uuid to 9.0 and 9.1 contrib ports.
Sat, 11 Jun 2011
[ 23:14 girgen ] Original commit 
1.983 databases/Makefile
1.1 databases/postgresql91-client/Makefile
1.1 databases/postgresql91-contrib/Makefile
1.1 databases/postgresql91-contrib/pkg-descr
1.218 databases/postgresql91-server/Makefile
1.83 databases/postgresql91-server/distinfo
1.3 databases/postgresql91-server/files/502.pgsql.in
1.2 databases/postgresql91-server/files/pkg-install-server.in
1.6 databases/postgresql91-server/files/postgresql.in
1.22 databases/postgresql91-server/pkg-plist-client

(Only the first 10 of 12 ports in this commit are shown above. View all ports for this commit)
Add postgresql 9.1 beta1.

See http://www.postgresql.org/about/news.1313 for more info.

Also, use USERS knob instead of explicitally creating the pgsql user
while still accepting alternative names, using [1] with some added
magic.

PR:     157667 [1]

Number of commits found XX: 4

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
powerdns-recursor*May 29
gitlab-ceMay 28
rubygem-kaminari-coreMay 28
sane-backendsMay 28
sympaMay 26
chromiumMay 24
piwigoMay 23
drupal7May 22
sympaMay 22
tomcat-develMay 22
tomcat7May 22
tomcat85May 22
tomcat9May 22
unboundMay 22
zabbix3-proxyMay 20

18 vulnerabilities affecting 165 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-05-29 07:54:06


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 39453
Broken 83
Deprecated 632
Ignore 350
Forbidden 5
Restricted 147
No CDROM 76
Vulnerable 24
Expired 15
Set to expire 582
Interactive 0
new 24 hours 11
new 48 hours11
new 7 days39
new fortnight88
new month186

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.