Correct security info, per Noah.
authorDave Page <dpage@pgadmin.org>
Fri, 12 Feb 2016 08:55:39 +0000 (08:55 +0000)
committerDave Page <dpage@pgadmin.org>
Fri, 12 Feb 2016 08:55:39 +0000 (08:55 +0000)
templates/pages/support/security.html

index 82db5369f26d56d46f7d9270a81f3a5c7ec8e488..5ee0f58adb508672f64e099ad8a9d0bde77acb73 100644 (file)
@@ -68,19 +68,10 @@ to determine if the bug affects specific installations or not.
    <td class="colMid">9.5, 9.4, 9.3, 9.2, 9.1</td>
    <td class="colMid">9.5.1, 9.4.6, 9.3.11, 9.2.15, 9.1.20</td>
    <td class="colMid">core server</td>
-   <td class="colMid">B</td>
+   <td class="colMid">A</td>
    <td class="colLast">Unchecked regex can crash the server</td>
   </tr>
   
-  <tr valign="top">
-   <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766">CVE-2016-0766</a></td>
-   <td class="colMid">9.5, 9.4, 9.3, 9.2, 9.1</td>
-   <td class="colMid">9.5.1, 9.4.6, 9.3.11, 9.2.15, 9.1.20</td>
-   <td class="colMid">contrib module</td>
-   <td class="colMid">C</td>
-   <td class="colLast">Privilege escalation by changing PL/Java config settings</td>
-  </tr>
-
   <tr valign="top">
    <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289">CVE-2015-5289</a></td>
    <td class="colMid">9.4, 9.3</td>