Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 May 2019 12:41:16 +0000 (UTC)
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r501171 - head/security/vuxml
Message-ID:  <201905101241.x4ACfGFA059894@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: girgen
Date: Fri May 10 12:41:15 2019
New Revision: 501171
URL: https://svnweb.freebsd.org/changeset/ports/501171

Log:
  Add security issues from latest postgresql release

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri May 10 12:34:55 2019	(r501170)
+++ head/security/vuxml/vuln.xml	Fri May 10 12:41:15 2019	(r501171)
@@ -58,6 +58,86 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="065890c3-725e-11e9-b0e1-6cc21735f730">
+    <topic>PostgreSQL -- Selectivity estimators bypass row security policies</topic>
+    <affects>
+      <package>
+	<name>postgresql11-server</name>
+	<range><lt>11.3</lt></range>
+      </package>
+      <package>
+	<name>postgresql10-server</name>
+	<range><lt>10.8</lt></range>
+      </package>
+      <package>
+	<name>postgresql96-server</name>
+	<range><lt>9.6.13</lt></range>
+      </package>
+      <package>
+	<name>postgresql95-server</name>
+	<range><lt>9.5.17</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/about/news/1939/">;
+	  <p>
+	    PostgreSQL maintains statistics for tables by sampling
+	    data available in columns; this data is consulted during
+	    the query planning process. Prior to this release, a user
+	    able to execute SQL queries with permissions to read a
+	    given column could craft a leaky operator that could
+	    read whatever data had been sampled from that column.
+	    If this happened to include values from rows that the user
+	    is forbidden to see by a row security policy, the user
+	    could effectively bypass the policy. This is fixed by only
+	    allowing a non-leakproof operator to use this data if
+	    there are no relevant row security policies for the table.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.postgresql.org/about/news/1939/</url>;
+      <cvename>CVE-2019-10130</cvename>
+    </references>
+    <dates>
+      <discovery>2019-05-09</discovery>
+      <entry>2019-05-09</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="e66a5440-7258-11e9-b0e1-6cc21735f730">
+    <topic>PostgreSQL -- Memory disclosure in partition routing</topic>
+    <affects>
+      <package>
+	<name>postgresql11-server</name>
+	<range><lt>11.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/about/news/1939/">;
+	  <p>
+	    Prior to this release, a user running PostgreSQL 11 can read
+	    arbitrary bytes of server memory by executing a purpose-crafted
+	    INSERT statement to a partitioned table.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.postgresql.org/about/news/1939/</url>;
+      <cvename>CVE-2019-10129</cvename>
+    </references>
+    <dates>
+      <discovery>2019-05-09</discovery>
+      <entry>2019-05-09</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="a1de4ae9-6fda-11e9-9ba0-4c72b94353b5">
     <topic>gitea -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201905101241.x4ACfGFA059894>