Fix insufficiently-portable regression test case.
Some of the buildfarm members are evidently miserly enough of stack space
to pass the originally-committed form of this test. Increase the
requirement 10X to hopefully ensure that it fails as-expected everywhere.
Security: CVE-2015-5289
Branch
-
Fix insufficiently-portable regression test case.
Some of the buildfarm members are evidently miserly enough of stack space
to pass the originally-committed form of this test. Increase the
requirement 10X to hopefully ensure that it fails as-expected everywhere.
Security: CVE-2015-5289
Branch
-
Fix insufficiently-portable regression test case.
Some of the buildfarm members are evidently miserly enough of stack space
to pass the originally-committed form of this test. Increase the
requirement 10X to hopefully ensure that it fails as-expected everywhere.
Security: CVE-2015-5289
Branch
-
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
Prevent stack overflow in json-related functions.
Sufficiently-deep recursion heretofore elicited a SIGSEGV. If an
application constructs PostgreSQL json or jsonb values from arbitrary
user input, application users could have exploited this to terminate all
active database connections. That appl
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
master
Details
---
http://git.postgresql.org/pg/commitdiff/272ede71a66892e68d4de285a82f117ce23e10ba
Modified Files
--
doc/src/sgml
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_3_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/f7957536631e240321d6988edb4543dff35bc29b
Modified Files
--
doc/s
Prevent stack overflow in json-related functions.
Sufficiently-deep recursion heretofore elicited a SIGSEGV. If an
application constructs PostgreSQL json or jsonb values from arbitrary
user input, application users could have exploited this to terminate all
active database connections. That appl
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
Prevent stack overflow in json-related functions.
Sufficiently-deep recursion heretofore elicited a SIGSEGV. If an
application constructs PostgreSQL json or jsonb values from arbitrary
user input, application users could have exploited this to terminate all
active database connections. That appl
Fix insufficiently-portable regression test case.
Some of the buildfarm members are evidently miserly enough of stack space
to pass the originally-committed form of this test. Increase the
requirement 10X to hopefully ensure that it fails as-expected everywhere.
Security: CVE-2015-5289
Branch
-
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_2_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/dd5502a8d5caf4775e06a31d17641d49250f3d34
Modified Files
--
doc/s
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_1_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/7bb63b2f8451dad154f9314efc3c5d9714dc4bfe
Modified Files
--
doc/s
Prevent stack overflow in json-related functions.
Sufficiently-deep recursion heretofore elicited a SIGSEGV. If an
application constructs PostgreSQL json or jsonb values from arbitrary
user input, application users could have exploited this to terminate all
active database connections. That appl
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_5_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/808f1bdb3d9f662c4a46a43c6cf14a6ce33b4df5
Modified Files
--
doc/s
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
pgcrypto: Detect and report too-short crypt() salts.
Certain short salts crashed the backend or disclosed a few bytes of
backend memory. For existing salt-induced error conditions, emit a
message saying as much. Back-patch to 9.0 (all supported versions).
Josh Kupershmidt
Security: CVE-2015-52
Prevent stack overflow in json-related functions.
Sufficiently-deep recursion heretofore elicited a SIGSEGV. If an
application constructs PostgreSQL json or jsonb values from arbitrary
user input, application users could have exploited this to terminate all
active database connections. That appl
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_4_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/1ecae3a9afa162d07816e746344097dba58fddc0
Modified Files
--
doc/s
Last-minute updates for release notes.
Add entries for security and not-quite-security issues.
Security: CVE-2015-5288, CVE-2015-5289
Branch
--
REL9_0_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/47b06ecad45ee6f44045fe35c4cfc15dafedc0a0
Modified Files
--
doc/s
Fix typo in docs.
Pallavi Sontakke
Branch
--
REL9_5_STABLE
Details
---
http://git.postgresql.org/pg/commitdiff/36d4a50a886dacdb9e4a6716aca984edd3add83b
Modified Files
--
doc/src/sgml/func.sgml |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
Sent via pgsql-commi
Fix typo in docs.
Pallavi Sontakke
Branch
--
master
Details
---
http://git.postgresql.org/pg/commitdiff/41562b14bb9085378957f9a08de4518ae049ffca
Modified Files
--
doc/src/sgml/func.sgml |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
Sent via pgsql-committers m
Add BSWAP64 macro.
This is like BSWAP32, but for 64-bit values. Since we've got two of
them now and they have use cases (like sortsupport) beyond CRCs, move
the definitions to their own header file.
Peter Geoghegan
Branch
--
master
Details
---
http://git.postgresql.org/pg/commitdiff/c1
Hyphenate variable-length for consistency.
We hyphenate "fixed-length" earlier in the same sentence, and overall we
more often use "variable-length" rather than "variable length".
Nikolay Shaplov
Branch
--
master
Details
---
http://git.postgresql.org/pg/commitdiff/1e353198612586befd44fe
Correct pg_indent to pgindent in various comments.
David Christensen
Branch
--
master
Details
---
http://git.postgresql.org/pg/commitdiff/fd5eaad71529d508a1b1e411b3dc16e0b2d33da5
Modified Files
--
src/include/storage/s_lock.h |2 +-
src/include/utils/elog.h
28 matches
Mail list logo