aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorPalle Girgensohn <girgen@FreeBSD.org>2022-05-11 16:29:46 +0000
committerPalle Girgensohn <girgen@FreeBSD.org>2022-05-12 13:40:16 +0000
commit4a835475da61e30632ee58f316429d7352d271a5 (patch)
tree67ffc65a40a61799b7d87f3d97da2d5b9a2f3689 /security
parent40908d8bebbc5f3757e771592d477196b1910ab1 (diff)
downloadports-4a835475da61e30632ee58f316429d7352d271a5.tar.gz
ports-4a835475da61e30632ee58f316429d7352d271a5.zip
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln-2022.xml54
1 files changed, 54 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 801f0e373acb..0ac5ff7bcd8b 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,57 @@
+ <vuln vid="157ce083-d145-11ec-ab9b-6cc21735f730">
+ <topic>PostgreSQL Server -- execute arbitrary SQL code as DBA user</topic>
+ <affects>
+ <package>
+ <name>postgresql14-server</name>
+ <range><lt>14.3</lt></range>
+ </package>
+ <package>
+ <name>postgresql13-server</name>
+ <range><lt>13.7</lt></range>
+ </package>
+ <package>
+ <name>postgresql12-server</name>
+ <range><lt>12.11</lt></range>
+ </package>
+ <package>
+ <name>postgresql11-server</name>
+ <range><lt>11.16</lt></range>
+ </package>
+ <package>
+ <name>postgresql10-server</name>
+ <range><lt>10.21</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL project reports:</p>
+ <blockquote>
+ <p>
+ Confine additional operations within "security restricted
+ operation" sandboxes.
+ </p>
+ <p>
+ Autovacuum, CLUSTER, CREATE INDEX, REINDEX, REFRESH MATERIALIZED VIEW,
+ and pg_amcheck activated the "security restricted operation" protection
+ mechanism too late, or even not at all in some code paths.
+ A user having permission to create non-temporary objects within a
+ database could define an object that would execute arbitrary SQL
+ code with superuser permissions the next time that autovacuum
+ processed the object, or that some superuser ran one of the affected
+ commands against it.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2022-1552</cvename>
+ </references>
+ <dates>
+ <discovery>2022-05-11</discovery>
+ <entry>2022-05-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ac91cf5e-d098-11ec-bead-3065ec8fd3ec">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>