aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorgirgen <girgen@FreeBSD.org>2015-02-06 06:54:21 +0800
committergirgen <girgen@FreeBSD.org>2015-02-06 06:54:21 +0800
commitf6607fae60d51f1f7a6b8bb774a2683c61d4f611 (patch)
tree2d8f0d37e3fad2654cc7de63d838e06212a1322c /security/vuxml
parentcc67df9c68f22aee5fbdd771fa06577c2a308a64 (diff)
downloadfreebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.tar.gz
freebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.tar.zst
freebsd-ports-gnome-f6607fae60d51f1f7a6b8bb774a2683c61d4f611.zip
Update PostgreSQL-9.x to latests versions.
This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml47
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 98bbbcc2f1f8..4b82f64467cf 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,53 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3b40bf2c-ad83-11e4-a2b2-0026551a22dc">
+ <topic>PostgreSQL -- multiple buffer overflows and memory issues</topic>
+ <affects>
+ <package>
+ <name>postgresql-server</name>
+ <range><ge>9.0.0</ge><lt>9.0.19</lt></range>
+ <range><ge>9.1.0</ge><lt>9.1.15</lt></range>
+ <range><ge>9.2.0</ge><lt>9.2.10</lt></range>
+ <range><ge>9.3.0</ge><lt>9.3.6</lt></range>
+ <range><ge>9.4.0</ge><lt>9.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PostgreSQL Project reports:</p>
+ <blockquote cite="http://www.postgresql.org/about/news/1569/">
+ <p>This update fixes multiple security issues reported in PostgreSQL
+ over the past few months. All of these issues require prior
+ authentication, and some require additional conditions, and as such
+ are not considered generally urgent. However, users should examine
+ the list of security holes patched below in case they are particularly
+ vulnerable.</p>
+ <ol>
+ <li>CVE-2015-0241 Buffer overruns in "to_char" functions.</li>
+ <li>CVE-2015-0242 Buffer overrun in replacement printf family of
+ functions.</li>
+ <li>CVE-2015-0243 Memory errors in functions in the pgcrypto extension.</li>
+ <li>CVE-2015-0244 An error in extended protocol message reading.</li>
+ <li>CVE-2014-8161 Constraint violation errors can cause display of values in columns
+ which the user would not normally have rights to see.</li>
+ </ol>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2015-0241</cvename>
+ <cvename>CVE-2015-0242</cvename>
+ <cvename>CVE-2015-0243</cvename>
+ <cvename>CVE-2015-0244</cvename>
+ <cvename>CVE-2014-8161</cvename>
+ </references>
+ <dates>
+ <discovery>2015-02-05</discovery>
+ <entry>2015-02-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="24ce5597-acab-11e4-a847-206a8a720317">
<topic>krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092</topic>
<affects>