diff options
author | girgen <girgen@FreeBSD.org> | 2015-02-06 06:54:21 +0800 |
---|---|---|
committer | girgen <girgen@FreeBSD.org> | 2015-02-06 06:54:21 +0800 |
commit | f6607fae60d51f1f7a6b8bb774a2683c61d4f611 (patch) | |
tree | 2d8f0d37e3fad2654cc7de63d838e06212a1322c /security/vuxml | |
parent | cc67df9c68f22aee5fbdd771fa06577c2a308a64 (diff) | |
download | freebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.tar.gz freebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.tar.zst freebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.zip |
Update PostgreSQL-9.x to latests versions.
This update fixes multiple security issues reported in PostgreSQL over the past
few months. All of these issues require prior authentication, and some require
additional conditions, and as such are not considered generally urgent.
However, users should examine the list of security holes patched below in case
they are particularly vulnerable.
Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243,
CVE-2015-0244,CVE-2014-8161
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 98bbbcc2f1f8..4b82f64467cf 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,53 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3b40bf2c-ad83-11e4-a2b2-0026551a22dc"> + <topic>PostgreSQL -- multiple buffer overflows and memory issues</topic> + <affects> + <package> + <name>postgresql-server</name> + <range><ge>9.0.0</ge><lt>9.0.19</lt></range> + <range><ge>9.1.0</ge><lt>9.1.15</lt></range> + <range><ge>9.2.0</ge><lt>9.2.10</lt></range> + <range><ge>9.3.0</ge><lt>9.3.6</lt></range> + <range><ge>9.4.0</ge><lt>9.4.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>PostgreSQL Project reports:</p> + <blockquote cite="http://www.postgresql.org/about/news/1569/"> + <p>This update fixes multiple security issues reported in PostgreSQL + over the past few months. All of these issues require prior + authentication, and some require additional conditions, and as such + are not considered generally urgent. However, users should examine + the list of security holes patched below in case they are particularly + vulnerable.</p> + <ol> + <li>CVE-2015-0241 Buffer overruns in "to_char" functions.</li> + <li>CVE-2015-0242 Buffer overrun in replacement printf family of + functions.</li> + <li>CVE-2015-0243 Memory errors in functions in the pgcrypto extension.</li> + <li>CVE-2015-0244 An error in extended protocol message reading.</li> + <li>CVE-2014-8161 Constraint violation errors can cause display of values in columns + which the user would not normally have rights to see.</li> + </ol> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-0241</cvename> + <cvename>CVE-2015-0242</cvename> + <cvename>CVE-2015-0243</cvename> + <cvename>CVE-2015-0244</cvename> + <cvename>CVE-2014-8161</cvename> + </references> + <dates> + <discovery>2015-02-05</discovery> + <entry>2015-02-05</entry> + </dates> + </vuln> + <vuln vid="24ce5597-acab-11e4-a847-206a8a720317"> <topic>krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092</topic> <affects> |