70a06c4f2e
Security Fixes for Regular Expressions, PL/Java This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input. The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser URL: http://www.postgresql.org/about/news/1644/ Security: CVE-2016-0773, CVE-2016-0766
4 lines
340 B
Text
4 lines
340 B
Text
SHA256 (postgresql/postgresql-9.3.11.tar.bz2) = 3d222a90c941d3a6c02c7c749fc9eb54ff20a1166570459d09c5476743496a21
|
|
SIZE (postgresql/postgresql-9.3.11.tar.bz2) = 17047707
|
|
SHA256 (postgresql/pg-929-icu-2015-04-18.diff.gz) = 9aff1ba25fbe5892a3868bff516df685531c85901c360548e38bf2e5fa0e14ab
|
|
SIZE (postgresql/pg-929-icu-2015-04-18.diff.gz) = 4469
|