Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Feb 2016 22:35:55 +0000 (UTC)
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r408834 - head/security/vuxml
Message-ID:  <201602132235.u1DMZtaU089196@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: girgen
Date: Sat Feb 13 22:35:55 2016
New Revision: 408834
URL: https://svnweb.freebsd.org/changeset/ports/408834

Log:
  Document security problems in PostgreSQL
  
  Security:	CVE-2016-0773, CVE-2016-0766

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Sat Feb 13 22:35:49 2016	(r408833)
+++ head/security/vuxml/vuln.xml	Sat Feb 13 22:35:55 2016	(r408834)
@@ -57,6 +57,64 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="e8b6605b-d29f-11e5-8458-6cc21735f730">
+    <topic>PostgreSQL -- Security Fixes for Regular Expressions, PL/Java.</topic>
+    <affects>
+      <package>
+	<name>postgresql91-server</name>
+	<range><ge>9.1.0</ge><lt>9.1.20</lt></range>
+      </package>
+      <package>
+	<name>postgresql92-server</name>
+	<range><ge>9.2.0</ge><lt>9.2.15</lt></range>
+      </package>
+      <package>
+	<name>postgresql93-server</name>
+	<range><ge>9.3.0</ge><lt>9.3.11</lt></range>
+      </package>
+      <package>
+	<name>postgresql94-server</name>
+	<range><ge>9.4.0</ge><lt>9.4.6</lt></range>
+      </package>
+      <package>
+	<name>postgresql95-server</name>
+	<range><ge>9.5.0</ge><lt>9.5.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>PostgreSQL project reports:</p>
+	<blockquote cite="http://www.postgresql.org/about/news/1615/">;
+	  <p>
+	  Security Fixes for Regular Expressions, PL/Java
+	  </p>
+	  <ul>
+	    <li>CVE-2016-0773: This release closes security hole CVE-2016-0773,
+	    an issue with regular expression (regex) parsing. Prior code allowed
+	    users to pass in expressions which included out-of-range Unicode
+	    characters, triggering a backend crash.  This issue is critical for
+	    PostgreSQL systems with untrusted users or which generate regexes
+	    based on user input.
+	    </li>
+	    <li>CVE-2016-0766: The update also fixes CVE-2016-0766, a privilege
+	    escalation issue for users of PL/Java.  Certain custom configuration
+	    settings (GUCS) for PL/Java will now be modifiable only by the
+	    database superuser
+	    </li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2016-0773</cvename>
+      <cvename>CVE-2016-0766</cvename>
+    </references>
+    <dates>
+      <discovery>2016-02-08</discovery>
+      <entry>2016-02-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="5d8e56c3-9e67-4d5b-81c9-3a409dfd705f">
     <topic>flash -- multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201602132235.u1DMZtaU089196>