Fix accidentally swapped CVE numbers
authorMagnus Hagander <magnus@hagander.net>
Fri, 28 Mar 2014 18:18:42 +0000 (19:18 +0100)
committerMagnus Hagander <magnus@hagander.net>
Fri, 28 Mar 2014 18:21:23 +0000 (19:21 +0100)
Reported by Steve Christey Coley

templates/pages/support/security.html

index 5c5caeacd057dcf8255ea1b7d628404354fd30db..7d1391893cd82fce46ec7f6062151c65063c66f5 100644 (file)
@@ -100,18 +100,18 @@ to determine if the bug affects specific installations or not.
    <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063">CVE-2014-0063</a></td>
    <td class="colMid">9.3, 9.2, 9.1, 9.0, 8.4</td>
    <td class="colMid">9.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20</td>
-   <td class="colMid">core server, contrib</td>
+   <td class="colMid">core server, ECPG</td>
    <td class="colMid">C</td>
-   <td class="colLast">Potential buffer overruns due to integer overflow in size calculations. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
+   <td class="colLast">Potential buffer overruns in datetime input/output. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
   </tr>
 
   <tr valign="top">
    <td class="colFirst"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064">CVE-2014-0064</a></td>
    <td class="colMid">9.3, 9.2, 9.1, 9.0, 8.4</td>
    <td class="colMid">9.3.3, 9.2.7, 9.1.12, 9.0.16, 8.4.20</td>
-   <td class="colMid">core server, ECPG</td>
+   <td class="colMid">core server, contrib</td>
    <td class="colMid">C</td>
-   <td class="colLast">Potential buffer overruns in datetime input/output. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
+   <td class="colLast">Potential buffer overruns due to integer overflow in size calculations. <a href="http://wiki.postgresql.org/wiki/20140220securityrelease">Details</a></td>
   </tr>
 
   <tr valign="top">