Bugzilla – Bug 864850
VUL-0: CVE-2014-0063: postgresql: stack-based buffer overflow in datetime input/output
Last modified: 2018-11-07 16:27:42 UTC
CVE-2014-0063 It was found that the buffers used to hold datetime output were too small. Long output could lead to a stack-based buffer overflow, possibly allowing an authenticated database user to crash the PostgreSQL server or execute arbitrary code. Acknowledgements: Thanks to the PostgreSQL project for reporting this issue. Upstream acknowledges Daniel Schüssler as the original reporter. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0063 https://bugzilla.redhat.com/show_bug.cgi?id=1065226
bugbot adjusting priority
The SWAMPID for this issue is 56361. This issue was rated as moderate. Please submit fixed packages until 2014-03-07. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
Affected packages: SLE-11-SP3: postgresql SLE-10-SP3-TERADATA: postgresql SLE-11-SP2: postgresql
openSUSE-SU-2014:0345-1: An update that fixes 8 vulnerabilities is now available. Category: security (moderate) Bug References: 864845,864846,864847,864850,864851,864852,864853 CVE References: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063,CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067 Sources used: openSUSE 13.1 (src): postgresql92-9.2.7-4.4.1, postgresql92-libs-9.2.7-4.4.1 openSUSE 12.3 (src): postgresql92-9.2.7-1.12.1, postgresql92-libs-9.2.7-1.12.1
openSUSE-SU-2014:0368-1: An update that fixes 8 vulnerabilities is now available. Category: security (moderate) Bug References: 864845,864846,864847,864850,864851,864852,864853 CVE References: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063,CVE-2014-0064,CVE-2014-0065,CVE-2014-0066,CVE-2014-0067 Sources used: openSUSE 11.4 (src): postgresql-9.0.16-43.1, postgresql-libs-9.0.16-43.1
Update released for: libecpg6, libpq5, postgresql91, postgresql91-contrib, postgresql91-debuginfo, postgresql91-debugsource, postgresql91-devel, postgresql91-docs, postgresql91-libs, postgresql91-libs-debuginfo, postgresql91-libs-debugsource, postgresql91-plperl, postgresql91-plpython, postgresql91-pltcl, postgresql91-server, postgresql91-test Products: SLE-DEBUGINFO 11-SP1-TERADATA (x86_64) SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: libecpg6, libecpg6-32bit, libecpg6-64bit, libecpg6-x86, libpq5, libpq5-32bit, libpq5-64bit, libpq5-x86, postgresql91, postgresql91-contrib, postgresql91-debuginfo, postgresql91-debugsource, postgresql91-devel, postgresql91-docs, postgresql91-libs, postgresql91-libs-debuginfo, postgresql91-libs-debugsource, postgresql91-plperl, postgresql91-plpython, postgresql91-pltcl, postgresql91-server, postgresql91-test Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SDK 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
SUSE-SU-2014:0461-1: An update that fixes 7 vulnerabilities is now available. Category: security (moderate) Bug References: 864845,864846,864847,864850,864851,864852,864853 CVE References: CVE-2014-0060,CVE-2014-0061,CVE-2014-0062,CVE-2014-0063,CVE-2014-0064,CVE-2014-0065,CVE-2014-0066 Sources used: SUSE Linux Enterprise Software Development Kit 11 SP3 (src): postgresql91-libs-9.1.12-0.3.1 SUSE Linux Enterprise Server 11 SP3 for VMware (src): postgresql91-9.1.12-0.3.1, postgresql91-libs-9.1.12-0.3.1 SUSE Linux Enterprise Server 11 SP3 (src): postgresql91-9.1.12-0.3.1, postgresql91-libs-9.1.12-0.3.1 SUSE Linux Enterprise Desktop 11 SP3 (src): postgresql91-9.1.12-0.3.1, postgresql91-libs-9.1.12-0.3.1
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2014-12-25. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/60006
released