CVE 2014-0065
Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
Related bugs and status
CVE-2014-0065 (Candidate) is related to these bugs:
Bug #991725: postgres is using deprecated /proc/PID/oom_adj
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
991725 | postgres is using deprecated /proc/PID/oom_adj | postgresql-9.3 (Ubuntu) | Low | Fix Released | ||
991725 | postgres is using deprecated /proc/PID/oom_adj | postgresql-9.3 (Debian) | Unknown | Fix Released |
Bug #1282677: New upstream microreleases 9.3.3, 9.1.12, 8.4.20
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.3 (Ubuntu) | High | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.3 (Ubuntu Trusty) | High | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.1 (Ubuntu) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.1 (Ubuntu Precise) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.1 (Ubuntu Quantal) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.1 (Ubuntu Saucy) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-9.1 (Ubuntu Trusty) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-8.4 (Ubuntu) | Undecided | Invalid | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-8.4 (Ubuntu Lucid) | Undecided | Fix Released | ||
1282677 | New upstream microreleases 9.3.3, 9.1.12, 8.4.20 | postgresql-8.4 (Ubuntu Precise) | Undecided | Fix Released |
See the
CVE page on Mitre.org
for more details.