aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorgirgen <girgen@FreeBSD.org>2014-02-21 02:11:25 +0800
committergirgen <girgen@FreeBSD.org>2014-02-21 02:11:25 +0800
commitac782ff70e7e854b1bac0d14ea9c4bc5d0b65169 (patch)
tree698ff0b3f9a62f2406ff217b4ec4df3a30b9e4d4 /security
parentfa538d4c848a10a138e55fb2c6e41e8e12cca35b (diff)
downloadfreebsd-ports-gnome-ac782ff70e7e854b1bac0d14ea9c4bc5d0b65169.tar.gz
freebsd-ports-gnome-ac782ff70e7e854b1bac0d14ea9c4bc5d0b65169.tar.zst
freebsd-ports-gnome-ac782ff70e7e854b1bac0d14ea9c4bc5d0b65169.zip
The PostgreSQL Global Development Group has released an important
update to all supported versions of the PostgreSQL database system, which includes minor versions 9.3.3, 9.2.7, 9.1.12, 9.0.16, and 8.4.20. This update contains fixes for multiple security issues, as well as several fixes for replication and data integrity issues. All users are urged to update their installations at the earliest opportunity, especially those using binary replication or running a high-security application. This update fixes CVE-2014-0060, in which PostgreSQL did not properly enforce the WITH ADMIN OPTION permission for ROLE management. Before this fix, any member of a ROLE was able to grant others access to the same ROLE regardless if the member was given the WITH ADMIN OPTION permission. It also fixes multiple privilege escalation issues, including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064, CVE-2014-0065, and CVE-2014-0066. More information on these issues can be found on our security page and the security issue detail wiki page. Security: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063 CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml132
1 files changed, 93 insertions, 39 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a9bd012479ba..05792377bd1d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,60 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="42d42090-9a4d-11e3-b029-08002798f6ff">
+ <topic>PostgreSQL -- multiple privilege issues</topic>
+ <affects>
+ <package>
+ <name>postgresql-server</name>
+ <range><lt>8.4.20</lt></range>
+ <range><ge>9.0.0</ge><lt>9.0.16</lt></range>
+ <range><ge>9.1.0</ge><lt>9.1.12</lt></range>
+ <range><ge>9.2.0</ge><lt>9.2.7</lt></range>
+ <range><ge>9.3.0</ge><lt>9.3.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PostgreSQL Project reports:</p>
+ <blockquote cite="http://www.postgresql.org/about/news/1506/">
+ <p>This update fixes CVE-2014-0060, in which PostgreSQL did not
+ properly enforce the WITH ADMIN OPTION permission for ROLE management.
+ Before this fix, any member of a ROLE was able to grant others access
+ to the same ROLE regardless if the member was given the WITH ADMIN
+ OPTION permission. It also fixes multiple privilege escalation issues,
+ including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064,
+ CVE-2014-0065, and CVE-2014-0066. More information on these issues can
+ be found on our security page and the security issue detail wiki page.
+ </p>
+ <p>
+ With this release, we are also alerting users to a known security hole
+ that allows other users on the same machine to gain access to an
+ operating system account while it is doing "make check":
+ CVE-2014-0067. "Make check" is normally part of building PostgreSQL
+ from source code. As it is not possible to fix this issue without
+ causing significant issues to our testing infrastructure, a patch will
+ be released separately and publicly. Until then, users are strongly
+ advised not to run "make check" on machines where untrusted users have
+ accounts.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-0060</cvename>
+ <cvename>CVE-2014-0061</cvename>
+ <cvename>CVE-2014-0062</cvename>
+ <cvename>CVE-2014-0063</cvename>
+ <cvename>CVE-2014-0064</cvename>
+ <cvename>CVE-2014-0065</cvename>
+ <cvename>CVE-2014-0066</cvename>
+ <cvename>CVE-2014-0067</cvename>
+ </references>
+ <dates>
+ <discovery>2014-02-20</discovery>
+ <entry>2014-02-20</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0871d18b-9638-11e3-a371-6805ca0b3d42">
<topic>phpMyAdmin -- Self-XSS due to unescaped HTML output in import.</topic>
<affects>
@@ -101,48 +155,48 @@ Note: Please add new entries to the beginning of this file.
<li>
<p>iSECURITY-105</p>
<p>In some places, Jenkins XML API uses XStream to deserialize
- arbitrary content, which is affected by CVE-2013-7285 reported
- against XStream. This allows malicious users of Jenkins with
- a limited set of permissions to execute arbitrary code inside
- Jenkins master.</p>
+ arbitrary content, which is affected by CVE-2013-7285 reported
+ against XStream. This allows malicious users of Jenkins with
+ a limited set of permissions to execute arbitrary code inside
+ Jenkins master.</p>
</li>
<li>
<p>SECURITY-76 &amp; SECURITY-88 / CVE-2013-5573</p>
<p>Restrictions of HTML tags for user-editable contents are too
- lax. This allows malicious users of Jenkins to trick other
- unsuspecting users into providing sensitive information.</p>
+ lax. This allows malicious users of Jenkins to trick other
+ unsuspecting users into providing sensitive information.</p>
</li>
<li>
<p>SECURITY-109</p>
<p>Plugging a hole in the earlier fix to SECURITY-55. Under some
- circimstances, a malicious user of Jenkins can configure job
- X to trigger another job Y that the user has no access to.</p>
+ circimstances, a malicious user of Jenkins can configure job
+ X to trigger another job Y that the user has no access to.</p>
</li>
<li>
<p>SECURITY-108</p>
<p>CLI job creation had a directory traversal vulnerability. This
- allows a malicious user of Jenkins with a limited set of
- permissions to overwrite files in the Jenkins master and
- escalate privileges.</p>
+ allows a malicious user of Jenkins with a limited set of
+ permissions to overwrite files in the Jenkins master and
+ escalate privileges.</p>
</li>
<li>
<p>SECURITY-106</p>
<p>The embedded Winstone servlet container is susceptive to
- session hijacking attack.</p>
+ session hijacking attack.</p>
</li>
<li>
<p>SECURITY-93</p>
<p>The password input control in the password parameter
- definition in the Jenkins UI was serving the actual value of
- the password in HTML, not an encrypted one. If a sensitive
- value is set as the default value of such a parameter
- definition, it can be exposed to unintended audience.</p>
+ definition in the Jenkins UI was serving the actual value of
+ the password in HTML, not an encrypted one. If a sensitive
+ value is set as the default value of such a parameter
+ definition, it can be exposed to unintended audience.</p>
</li>
<li>
<p>SECURITY-89</p>
<p>Deleting the user was not invalidating the API token,
- allowing users to access Jenkins when they shouldn't be
- allowed to do so.</p>
+ allowing users to access Jenkins when they shouldn't be
+ allowed to do so.</p>
</li>
<li>
<p>SECURITY-80</p>
@@ -151,52 +205,52 @@ Note: Please add new entries to the beginning of this file.
<li>
<p>SECURITY-79</p>
<p>"Jenkins' own user database" was revealing the
- presence/absence of users when login attempts fail.</p>
+ presence/absence of users when login attempts fail.</p>
</li>
<li>
<p>SECURITY-77</p>
<p>Jenkins had a cross-site scripting vulnerability in one of its
- cookies. If Jenkins is deployed in an environment that allows
- an attacker to override Jenkins cookies in victim's browser,
- this vulnerability can be exploited.</p>
+ cookies. If Jenkins is deployed in an environment that allows
+ an attacker to override Jenkins cookies in victim's browser,
+ this vulnerability can be exploited.</p>
</li>
<li>
<p>SECURITY-75</p>
<p>Jenkins was vulnerable to session fixation attack. If Jenkins
- is deployed in an environment that allows an attacker to
- override Jenkins cookies in victim's browser, this
- vulnerability can be exploited.</p>
+ is deployed in an environment that allows an attacker to
+ override Jenkins cookies in victim's browser, this
+ vulnerability can be exploited.</p>
</li>
<li>
<p>SECURITY-74</p>
<p>Stored XSS vulnerability. A malicious user of Jenkins with a
- certain set of permissions can cause Jenkins to store
- arbitrary HTML fragment.</p>
+ certain set of permissions can cause Jenkins to store
+ arbitrary HTML fragment.</p>
</li>
<li>
<p>SECURITY-73</p>
<p>Some of the system diagnostic functionalities were checking a
- lesser permission than it should have. In a very limited
- circumstances, this can cause an attacker to gain information
- that he shouldn't have access to.</p>
+ lesser permission than it should have. In a very limited
+ circumstances, this can cause an attacker to gain information
+ that he shouldn't have access to.</p>
</li>
</ol>
<p>Severity</p>
<ol>
<li>SECURITY-106, and SECURITY-80 are rated <strong>high</strong>. An attacker only
- needs direct HTTP access to the server to mount this attack.</li>
+ needs direct HTTP access to the server to mount this attack.</li>
<li>SECURITY-105, SECURITY-109, SECURITY-108, and SECURITY-74 are
- rated <strong>high</strong>. These vulnerabilities allow attackes with valid
- Jenkins user accounts to escalate privileges in various ways.</li>
+ rated <strong>high</strong>. These vulnerabilities allow attackes with valid
+ Jenkins user accounts to escalate privileges in various ways.</li>
<li>SECURITY-76, SECURIT-88, and SECURITY-89 are rated <strong>medium.</strong>
- These vulnerabilities requires an attacker to be an user of
- Jenkins, and the mode of the attack is limited.</li>
+ These vulnerabilities requires an attacker to be an user of
+ Jenkins, and the mode of the attack is limited.</li>
<li>SECURITY-93, and SECURITY-79 are <strong>rated</strong> low. These
- vulnerabilities only affect a small part of Jenkins and has
- limited impact.</li>
+ vulnerabilities only affect a small part of Jenkins and has
+ limited impact.</li>
<li>SECURITY-77, SECURITY-75, and SECURITY-73 are <strong>rated</strong> low. These
- vulnerabilities are hard to exploit unless combined with other
- exploit in the network.</li>
+ vulnerabilities are hard to exploit unless combined with other
+ exploit in the network.</li>
</ol>
</blockquote>
</body>