Date: Thu, 5 Feb 2015 22:54:22 +0000 (UTC) From: Palle Girgensohn <girgen@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r378499 - head/security/vuxml Message-ID: <201502052254.t15MsM9r003035@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: girgen Date: Thu Feb 5 22:54:21 2015 New Revision: 378499 URL: https://svnweb.freebsd.org/changeset/ports/378499 QAT: https://qat.redports.org/buildarchive/r378499/ Log: Update PostgreSQL-9.x to latests versions. This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Feb 5 22:51:22 2015 (r378498) +++ head/security/vuxml/vuln.xml Thu Feb 5 22:54:21 2015 (r378499) @@ -57,6 +57,53 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="3b40bf2c-ad83-11e4-a2b2-0026551a22dc"> + <topic>PostgreSQL -- multiple buffer overflows and memory issues</topic> + <affects> + <package> + <name>postgresql-server</name> + <range><ge>9.0.0</ge><lt>9.0.19</lt></range> + <range><ge>9.1.0</ge><lt>9.1.15</lt></range> + <range><ge>9.2.0</ge><lt>9.2.10</lt></range> + <range><ge>9.3.0</ge><lt>9.3.6</lt></range> + <range><ge>9.4.0</ge><lt>9.4.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>PostgreSQL Project reports:</p> + <blockquote cite="http://www.postgresql.org/about/news/1569/"> + <p>This update fixes multiple security issues reported in PostgreSQL + over the past few months. All of these issues require prior + authentication, and some require additional conditions, and as such + are not considered generally urgent. However, users should examine + the list of security holes patched below in case they are particularly + vulnerable.</p> + <ol> + <li>CVE-2015-0241 Buffer overruns in "to_char" functions.</li> + <li>CVE-2015-0242 Buffer overrun in replacement printf family of + functions.</li> + <li>CVE-2015-0243 Memory errors in functions in the pgcrypto extension.</li> + <li>CVE-2015-0244 An error in extended protocol message reading.</li> + <li>CVE-2014-8161 Constraint violation errors can cause display of values in columns + which the user would not normally have rights to see.</li> + </ol> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2015-0241</cvename> + <cvename>CVE-2015-0242</cvename> + <cvename>CVE-2015-0243</cvename> + <cvename>CVE-2015-0244</cvename> + <cvename>CVE-2014-8161</cvename> + </references> + <dates> + <discovery>2015-02-05</discovery> + <entry>2015-02-05</entry> + </dates> + </vuln> + <vuln vid="24ce5597-acab-11e4-a847-206a8a720317"> <topic>krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502052254.t15MsM9r003035>