Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 5 Feb 2015 22:54:22 +0000 (UTC)
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r378499 - head/security/vuxml
Message-ID:  <201502052254.t15MsM9r003035@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: girgen
Date: Thu Feb  5 22:54:21 2015
New Revision: 378499
URL: https://svnweb.freebsd.org/changeset/ports/378499
QAT: https://qat.redports.org/buildarchive/r378499/

Log:
  Update PostgreSQL-9.x to latests versions.
  
  This update fixes multiple security issues reported in PostgreSQL over the past
  few months. All of these issues require prior authentication, and some require
  additional conditions, and as such are not considered generally urgent.
  However, users should examine the list of security holes patched below in case
  they are particularly vulnerable.
  
  Security:	CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
  		CVE-2015-0244,CVE-2014-8161

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Feb  5 22:51:22 2015	(r378498)
+++ head/security/vuxml/vuln.xml	Thu Feb  5 22:54:21 2015	(r378499)
@@ -57,6 +57,53 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="3b40bf2c-ad83-11e4-a2b2-0026551a22dc">
+    <topic>PostgreSQL -- multiple buffer overflows and memory issues</topic>
+    <affects>
+      <package>
+	<name>postgresql-server</name>
+	<range><ge>9.0.0</ge><lt>9.0.19</lt></range>
+	<range><ge>9.1.0</ge><lt>9.1.15</lt></range>
+	<range><ge>9.2.0</ge><lt>9.2.10</lt></range>
+	<range><ge>9.3.0</ge><lt>9.3.6</lt></range>
+	<range><ge>9.4.0</ge><lt>9.4.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>PostgreSQL Project reports:</p>
+	<blockquote cite="http://www.postgresql.org/about/news/1569/">;
+	  <p>This update fixes multiple security issues reported in PostgreSQL
+	    over the past few months.  All of these issues require prior
+	    authentication, and some require additional conditions, and as such
+	    are not considered generally urgent.  However, users should examine
+	    the list of security holes patched below in case they are particularly
+	    vulnerable.</p>
+	  <ol>
+	    <li>CVE-2015-0241 Buffer overruns in "to_char" functions.</li>
+	    <li>CVE-2015-0242 Buffer overrun in replacement printf family of
+		functions.</li>
+	    <li>CVE-2015-0243 Memory errors in functions in the pgcrypto extension.</li>
+	    <li>CVE-2015-0244 An error in extended protocol message reading.</li>
+	    <li>CVE-2014-8161 Constraint violation errors can cause display of values in columns
+		which the user would not normally have rights to see.</li>
+	  </ol>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-0241</cvename>
+      <cvename>CVE-2015-0242</cvename>
+      <cvename>CVE-2015-0243</cvename>
+      <cvename>CVE-2015-0244</cvename>
+      <cvename>CVE-2014-8161</cvename>
+    </references>
+    <dates>
+      <discovery>2015-02-05</discovery>
+      <entry>2015-02-05</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="24ce5597-acab-11e4-a847-206a8a720317">
     <topic>krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502052254.t15MsM9r003035>