Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade PostgreSQL to 9.3.14 #1427

Merged
merged 1 commit into from
Sep 13, 2016
Merged

Upgrade PostgreSQL to 9.3.14 #1427

merged 1 commit into from
Sep 13, 2016

Conversation

robbkidd
Copy link
Contributor

@robbkidd robbkidd commented Sep 12, 2016

9.3.7:

  • CVE-2015-3165: Avoid possible crash when client disconnects just
    before the authentication timeout expires
  • CVE-2015-3166: Improve detection of system-call failures and
    information disclosure with out-of-memory situations and buffer
    overflows.
  • CVE-2015-3167: uniformly report decryption failures as "Wrong key or
    corrupt data" to avoid the risk of aiding attackers in recovering keys
    from other systems

9.3.10:

  • CVE-2015-5289: Guard against stack overflows in json parsing
  • CVE-2015-5288: Fix contrib/pgcrypto to detect and report too-short
    crypt() salts

9.3.11:

  • CVE-2016-0773: Very large character ranges in bracket expressions
    could cause infinite loops in some cases, and memory overwrites in
    other cases.
  • CVE-2007-4772: A more complete fix for an old fix to regex compiler
    handling loops.
  • CVE-2016-0766: Mitigate a PL/Java bug.

9.3.14:

  • CVE-2016-5423: possible mis-evaluation of nested CASE-WHEN expressions
  • CVE-2016-5424: Fix client programs' handling of special characters in
    database and role names. ... considered security fixes because crafted
    object names containing special characters could have been used to
    execute commands with superuser privileges the next time a superuser
    executes pg_dumpall or other routine maintenance operations.

[9.3.7](https://www.postgresql.org/docs/current/static/release-9-3-7.html):

* CVE-2015-3165: Avoid possible crash when client disconnects just
  before the authentication timeout expires
* CVE-2015-3166: Improve detection of system-call failures and
  information disclosure with out-of-memory situations and buffer
  overflows.
* CVE-2015-3167: uniformly report decryption failures as "Wrong key or
  corrupt data" to avoid the risk of aiding attackers in recovering keys
  from other systems

[9.3.10](https://www.postgresql.org/docs/current/static/release-9-3-10.html):

* CVE-2015-5289: Guard against stack overflows in json parsing
* CVE-2015-5288: Fix contrib/pgcrypto to detect and report too-short
  crypt() salts

[9.3.11](https://www.postgresql.org/docs/current/static/release-9-3-11.html):

* CVE-2016-0773: Very large character ranges in bracket expressions
  could cause infinite loops in some cases, and memory overwrites in
  other cases.
* CVE-2007-4772: A more complete fix for an old fix to regex compiler
  handling loops.
* CVE-2016-0766: Mitigate a PL/Java bug.

[9.3.14](https://www.postgresql.org/docs/current/static/release-9-3-14.html):

* CVE-2016-5423: possible mis-evaluation of nested CASE-WHEN expressions
* CVE-2016-5424: Fix client programs' handling of special characters in
  database and role names. ... considered security fixes because crafted
  object names containing special characters could have been used to
  execute commands with superuser privileges the next time a superuser
  executes pg_dumpall or other routine maintenance operations.

Signed-off-by: Robb Kidd <[email protected]>
@robbkidd
Copy link
Contributor Author

👍

Tested a couple permutations of upgrading Supermarket 2.3.8 and 2.3.15 to a build of this branch.

@chef-delivery chef-delivery merged commit ac31676 into master Sep 13, 2016
@robbkidd robbkidd deleted the robb/upgrade-pg-9-3-14 branch November 11, 2016 15:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants