{"id":"MGASA-2016-0085","summary":"Updated postgresql packages fix security vulnerabilities","details":"Updated postgresql packages fix security vulnerabilities:\n\nPostgreSQL 9.3.x before 9.3.11 and 9.4.x before 9.4.6 does not properly\nrestrict access to unspecified custom configuration settings (GUCS) for\nPL/Java, which allows attackers to gain privileges via unspecified vectors\n(CVE-2016-0766).\n\nPostgreSQL 9.3.x before 9.3.11 and 9.4.x before 9.4.6 allows remote attackers\nto cause a denial of service (infinite loop or buffer overflow and crash) via\na large Unicode character range in a regular expression (CVE-2016-0773).\n","modified":"2026-04-16T06:26:25.955217383Z","published":"2016-03-02T18:28:46Z","upstream":["CVE-2016-0766","CVE-2016-0773"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0085.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=17744"},{"type":"WEB","url":"http://www.ubuntu.com/usn/usn-2894-1/"}],"affected":[{"package":{"name":"postgresql9.3","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/postgresql9.3?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.3.11-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0085.json"}},{"package":{"name":"postgresql9.4","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/postgresql9.4?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.4.6-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0085.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}