From owner-svn-ports-head@FreeBSD.ORG Thu Feb 5 22:54:23 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DADF5D5C; Thu, 5 Feb 2015 22:54:22 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id BBC7EB1F; Thu, 5 Feb 2015 22:54:22 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t15MsMhY003038; Thu, 5 Feb 2015 22:54:22 GMT (envelope-from girgen@FreeBSD.org) Received: (from girgen@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t15MsM9r003035; Thu, 5 Feb 2015 22:54:22 GMT (envelope-from girgen@FreeBSD.org) Message-Id: <201502052254.t15MsM9r003035@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: girgen set sender to girgen@FreeBSD.org using -f From: Palle Girgensohn Date: Thu, 5 Feb 2015 22:54:22 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r378499 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Feb 2015 22:54:23 -0000 Author: girgen Date: Thu Feb 5 22:54:21 2015 New Revision: 378499 URL: https://svnweb.freebsd.org/changeset/ports/378499 QAT: https://qat.redports.org/buildarchive/r378499/ Log: Update PostgreSQL-9.x to latests versions. This update fixes multiple security issues reported in PostgreSQL over the past few months. All of these issues require prior authentication, and some require additional conditions, and as such are not considered generally urgent. However, users should examine the list of security holes patched below in case they are particularly vulnerable. Security: CVE-2015-0241,CVE-2015-0242,CVE-2015-0243, CVE-2015-0244,CVE-2014-8161 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Feb 5 22:51:22 2015 (r378498) +++ head/security/vuxml/vuln.xml Thu Feb 5 22:54:21 2015 (r378499) @@ -57,6 +57,53 @@ Notes: --> + + PostgreSQL -- multiple buffer overflows and memory issues + + + postgresql-server + 9.0.09.0.19 + 9.1.09.1.15 + 9.2.09.2.10 + 9.3.09.3.6 + 9.4.09.4.1 + + + + +

PostgreSQL Project reports:

+
+

This update fixes multiple security issues reported in PostgreSQL + over the past few months. All of these issues require prior + authentication, and some require additional conditions, and as such + are not considered generally urgent. However, users should examine + the list of security holes patched below in case they are particularly + vulnerable.

+
    +
  1. CVE-2015-0241 Buffer overruns in "to_char" functions.
  2. +
  3. CVE-2015-0242 Buffer overrun in replacement printf family of + functions.
  4. +
  5. CVE-2015-0243 Memory errors in functions in the pgcrypto extension.
  6. +
  7. CVE-2015-0244 An error in extended protocol message reading.
  8. +
  9. CVE-2014-8161 Constraint violation errors can cause display of values in columns + which the user would not normally have rights to see.
  10. +
+
+ +
+ + CVE-2015-0241 + CVE-2015-0242 + CVE-2015-0243 + CVE-2015-0244 + CVE-2014-8161 + + + 2015-02-05 + 2015-02-05 + +
+ krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092