Date: Thu, 11 May 2017 14:23:56 +0000 (UTC) From: Palle Girgensohn <girgen@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r440627 - head/security/vuxml Message-ID: <201705111423.v4BENuDp069150@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: girgen Date: Thu May 11 14:23:56 2017 New Revision: 440627 URL: https://svnweb.freebsd.org/changeset/ports/440627 Log: Add information about vulnerabilities in PostgreSQL Security: CVE-2017-7484 CVE-2017-7485 CVE-2017-7486 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu May 11 12:14:31 2017 (r440626) +++ head/security/vuxml/vuln.xml Thu May 11 14:23:56 2017 (r440627) @@ -58,6 +58,82 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="414c18bf-3653-11e7-9550-6cc21735f730"> + <topic>PostgreSQL vulnerabilities</topic> + <affects> + <package> + <name>postgresql92-client</name> + <range><ge>9.2.0</ge><lt>9.2.20</lt></range> + </package> + <package> + <name>postgresql93-client</name> + <range><ge>9.3.0</ge><lt>9.3.16</lt></range> + </package> + <package> + <name>postgresql94-client</name> + <range><ge>9.4.0</ge><lt>9.4.11</lt></range> + </package> + <package> + <name>postgresql95-client</name> + <range><ge>9.5.0</ge><lt>9.5.6</lt></range> + </package> + <package> + <name>postgresql96-client</name> + <range><ge>9.6.0</ge><lt>9.6.2</lt></range> + </package> + <package> + <name>postgresql92-server</name> + <range><ge>9.2.0</ge><lt>9.2.20</lt></range> + </package> + <package> + <name>postgresql93-server</name> + <range><ge>9.3.0</ge><lt>9.3.16</lt></range> + </package> + <package> + <name>postgresql94-server</name> + <range><ge>9.4.0</ge><lt>9.4.11</lt></range> + </package> + <package> + <name>postgresql95-server</name> + <range><ge>9.5.0</ge><lt>9.5.6</lt></range> + </package> + <package> + <name>postgresql96-server</name> + <range><ge>9.6.0</ge><lt>9.6.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The PostgreSQL project reports:</p> + <blockquote cite="http://www.postgresql.org/about/news/1746/"> + <p> + Security Fixes nested CASE expressions + + database and role names with embedded special characters + </p> + <ul> + <li>CVE-2017-7484: selectivity estimators bypass SELECT privilege + checks. + </li> + <li>CVE-2017-7485: libpq ignores PGREQUIRESSL environment variable + </li> + <li>CVE-2017-7486: pg_user_mappings view discloses foreign server + passwords. This applies to new databases, see the release notes for + the procedure to apply the fix to an existing database. + </li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2016-5423</cvename> + <cvename>CVE-2016-5424</cvename> + </references> + <dates> + <discovery>2017-05-11</discovery> + <entry>2017-05-11</entry> + </dates> + </vuln> + <vuln vid="0baee383-356c-11e7-b9a9-50e549ebab6c"> <topic>kauth: Local privilege escalation</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201705111423.v4BENuDp069150>