Release 9.6.1, 9.5.5, 9.4.10, and others.
authorStephen Frost <sfrost@snowman.net>
Thu, 27 Oct 2016 13:26:49 +0000 (09:26 -0400)
committerStephen Frost <sfrost@snowman.net>
Thu, 27 Oct 2016 13:26:49 +0000 (09:26 -0400)
media/css/layout.css
templates/index.html
templates/pages/support/security.html
templates/pages/support/security_archive.html

index fb1300a0072ac316ddb58afc7ba402f6fce79140..3e605773bda9b15800049e27c726d09a98979cac 100644 (file)
 
 #pgFrontFeature {
   position: relative;
-  background: #F5F5F5 url(/media/img/feature/feature_elephant.png) right bottom no-repeat;
-  /* background: #F5F5F5 url(/media/img/feature/feature_gears.png) right bottom no-repeat; */
+  /* background: #F5F5F5 url(/media/img/feature/feature_elephant.png) right bottom no-repeat; */
+  background: #F5F5F5 url(/media/img/feature/feature_gears.png) right bottom no-repeat;
   /* Also see pgFrontFeatureContent for image size */
   padding: 15px;
   margin-bottom: 1em;
index f63cc2dabb885c6e103d1eea722523b9689c6fff..5e6261b537052637cb115d121666ccea9ab2ce0c 100644 (file)
@@ -8,23 +8,24 @@
           <div id="pgFrontMain">
             <div id="pgFrontFeature">
               <div id="pgFrontFeatureContent">
-               <p><b>29<sup>th</sup> September 2016</b></p>
+               <p><b>29<sup>th</sup> October 2016</b></p>
                 <h1 id="txtFrontFeatureHeading">
-                  PostgreSQL 9.6 Released!
+                  PostgreSQL 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19 and 9.1.24 Released!
                 </h1>
                 <p>
                    The PostgreSQL Global Development Group is pleased to announce the availability of
-                   PostgreSQL 9.6.
+                   PostgreSQL 9.6.1, 9.5.5, 9.4.10, 9.3.15, 9.2.19 and 9.1.24.
                 </p>
                 <p>
-                   PostgreSQL 9.6 is a major new version of the world's most advanced Open Source database.
-                   This release includes support for parallel queries, performance enhancements to Foreign
-                   Data Wrappers, support for multiple synchronous standbys and much, much more.
+                                  This release fixes issues that can cause data corruption, which are described in
+                                  the release notes. It also patches a number of other bugs reported over the last
+                                  few months.  The project urges users to apply this update at the next possible
+                                  downtime.
                 </p>
                 <div id="txtFrontFeatureLink">
                   <br/>
-                  <img src="/media/img/layout/blt_blu_arrow.png" width="6" height="6" alt="" /><a href="/about/news/1703/" title="Release Announcement">Release Announcement</a><br />
-                  <img src="/media/img/layout/blt_blu_arrow.png" width="6" height="6" alt="" /><a href="/docs/9.6/static/release-9-6.html" title="Release Notes">Release Notes</a><br />
+                  <img src="/media/img/layout/blt_blu_arrow.png" width="6" height="6" alt="" /><a href="/about/news/1712/" title="Release Announcement">Release Announcement</a><br />
+                  <img src="/media/img/layout/blt_blu_arrow.png" width="6" height="6" alt="" /><a href="/docs/9.6/static/release-9-6-1.html" title="Release Notes">Release Notes</a><br />
                   <img src="/media/img/layout/blt_blu_arrow.png" width="6" height="6" alt="" /><a href="/download/" title="Download">Download</a><br />
                 </div>
               </div>
index 3099409910f0ee641016357fb7741326fc5f46cd..be30adc7d6bdf201ba26ea5d803dc0c4f021dee3 100644 (file)
@@ -36,7 +36,7 @@ criteria.
 
 <p>
 The following table lists all known security issues.
-Please note that versions prior to 9.1 are no longer
+Please note that versions prior to 9.2 are no longer
 supported.  An archive of vulnerabilities found only in unsupported 
 versions is
 <a href="/support/security_archive">on our Security Archive page</a>,
@@ -324,69 +324,6 @@ to determine if the bug affects specific installations or not.
    <td class="colLast">executing enum_recv() with wrong parameters crashes server</td>
   </tr>
 
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489">CVE-2012-3489</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.5, 9.0.9, 8.4.13, 8.3.20</td>
-   <td class="colMid">core server</td>
-   <td class="colMid">C</td>
-   <td class="colLast">xml_parse() DTD validation can be used to read arbitrary files</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488">CVE-2012-3488</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.5, 9.0.9, 8.4.13, 8.3.20</td>
-   <td class="colMid">contrib module</td>
-   <td class="colMid">C</td>
-   <td class="colLast">contrib/xml2's xslt_process() can be used to read and write arbitrary files</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143">CVE-2012-2143</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.4, 9.0.8, 8.4.12, 8.3.19</td>
-   <td class="colMid">contrib module</td>
-   <td class="colMid">C</td>
-   <td class="colLast">Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was used</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655">CVE-2012-2655</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.4, 9.0.8, 8.4.12, 8.3.19</td>
-   <td class="colMid">core server</td>
-   <td class="colMid">D</td>
-   <td class="colLast">SECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the server</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866">CVE-2012-0866</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.3, 9.0.7, 8.4.11, 8.3.18</td>
-   <td class="colMid">core server</td>
-   <td class="colMid">C</td>
-   <td class="colLast">Permissions on a function called by a trigger are not properly checked.</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867">CVE-2012-0867</a></td>
-   <td class="colMid">9.1, 9.0, 8.4</td>
-   <td class="colMid">9.1.3, 9.0.7, 8.4.11</td>
-   <td class="colMid">core server, limited deployments</td>
-   <td class="colMid">A</td>
-   <td class="colLast">SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.</td>
-  </tr>
-
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868">CVE-2012-0868</a></td>
-   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
-   <td class="colMid">9.1.3, 9.0.7, 8.4.11, 8.3.18</td>
-   <td class="colMid">core server</td>
-   <td class="colMid">C</td>
-   <td class="colLast">Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.</td>
-  </tr>
-  
  </table>
 </div>
 
index ca96a6d5d95d131ea80aae398ec3c052107d37ee..cdd07d718ad5a731eabf419ec1f5c1f184263ea4 100644 (file)
@@ -33,6 +33,69 @@ the main <a href="/support/security">security page</a>.
    <th class="colLast">Description</th>
   </tr>
 
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489">CVE-2012-3489</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.5, 9.0.9, 8.4.13, 8.3.20</td>
+   <td class="colMid">core server</td>
+   <td class="colMid">C</td>
+   <td class="colLast">xml_parse() DTD validation can be used to read arbitrary files</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488">CVE-2012-3488</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.5, 9.0.9, 8.4.13, 8.3.20</td>
+   <td class="colMid">contrib module</td>
+   <td class="colMid">C</td>
+   <td class="colLast">contrib/xml2's xslt_process() can be used to read and write arbitrary files</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143">CVE-2012-2143</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.4, 9.0.8, 8.4.12, 8.3.19</td>
+   <td class="colMid">contrib module</td>
+   <td class="colMid">C</td>
+   <td class="colLast">Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was used</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655">CVE-2012-2655</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.4, 9.0.8, 8.4.12, 8.3.19</td>
+   <td class="colMid">core server</td>
+   <td class="colMid">D</td>
+   <td class="colLast">SECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the server</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866">CVE-2012-0866</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.3, 9.0.7, 8.4.11, 8.3.18</td>
+   <td class="colMid">core server</td>
+   <td class="colMid">C</td>
+   <td class="colLast">Permissions on a function called by a trigger are not properly checked.</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867">CVE-2012-0867</a></td>
+   <td class="colMid">9.1, 9.0, 8.4</td>
+   <td class="colMid">9.1.3, 9.0.7, 8.4.11</td>
+   <td class="colMid">core server, limited deployments</td>
+   <td class="colMid">A</td>
+   <td class="colLast">SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities.</td>
+  </tr>
+
+  <tr valign="top">
+   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868">CVE-2012-0868</a></td>
+   <td class="colMid">9.1, 9.0, 8.4, 8.3</td>
+   <td class="colMid">9.1.3, 9.0.7, 8.4.11, 8.3.18</td>
+   <td class="colMid">core server</td>
+   <td class="colMid">C</td>
+   <td class="colLast">Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file.</td>
+  </tr>
+  
   <tr valign="top">
    <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015">CVE-2010-4015</a></td>
    <td class="colMid">9.0, 8.4, 8.3, 8.2</td>