You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa postgresql

Sigurnosni nedostaci programskog paketa postgresql

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for postgresql10
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:2028-1
Rating: important
References: #1178666 #1178667 #1178668
Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696

Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for postgresql10 fixes the following issues:

– Upgrade to version 10.15:
* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR … WITH HOLD and
firing of deferred triggers within index expressions and materialized
view queries.
* CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb.
b) When psql’s \connect command re-uses connection parameters, ensure
that all non-overridden parameters from a previous connection string
are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql’s \gset command from
modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA is not
observing daylight savings time.
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/10/release-10-15.html

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-2028=1

Package List:

– openSUSE Leap 15.1 (i586 x86_64):

postgresql10-10.15-lp151.2.21.1
postgresql10-contrib-10.15-lp151.2.21.1
postgresql10-contrib-debuginfo-10.15-lp151.2.21.1
postgresql10-debuginfo-10.15-lp151.2.21.1
postgresql10-debugsource-10.15-lp151.2.21.1
postgresql10-devel-10.15-lp151.2.21.1
postgresql10-devel-debuginfo-10.15-lp151.2.21.1
postgresql10-plperl-10.15-lp151.2.21.1
postgresql10-plperl-debuginfo-10.15-lp151.2.21.1
postgresql10-plpython-10.15-lp151.2.21.1
postgresql10-plpython-debuginfo-10.15-lp151.2.21.1
postgresql10-pltcl-10.15-lp151.2.21.1
postgresql10-pltcl-debuginfo-10.15-lp151.2.21.1
postgresql10-server-10.15-lp151.2.21.1
postgresql10-server-debuginfo-10.15-lp151.2.21.1
postgresql10-test-10.15-lp151.2.21.1

– openSUSE Leap 15.1 (noarch):

postgresql10-docs-10.15-lp151.2.21.1

References:

https://www.suse.com/security/cve/CVE-2020-25694.html
https://www.suse.com/security/cve/CVE-2020-25695.html
https://www.suse.com/security/cve/CVE-2020-25696.html
https://bugzilla.suse.com/1178666
https://bugzilla.suse.com/1178667
https://bugzilla.suse.com/1178668
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

openSUSE Security Update: Security update for postgresql12
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:2029-1
Rating: important
References: #1178666 #1178667 #1178668
Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696

Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for postgresql12 fixes the following issues:

– Upgrade to version 12.5:
* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR … WITH HOLD and
firing of deferred triggers within index expressions and materialized
view queries.
* CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb.
b) When psql’s \connect command re-uses connection parameters, ensure
that all non-overridden parameters from a previous connection string
are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql’s \gset command from
modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA is not
observing daylight savings time.
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-2029=1

Package List:

– openSUSE Leap 15.1 (x86_64):

libecpg6-12.5-lp151.10.1
libecpg6-debuginfo-12.5-lp151.10.1
libpq5-12.5-lp151.10.1
libpq5-debuginfo-12.5-lp151.10.1
postgresql12-12.5-lp151.10.1
postgresql12-contrib-12.5-lp151.10.1
postgresql12-contrib-debuginfo-12.5-lp151.10.1
postgresql12-debuginfo-12.5-lp151.10.1
postgresql12-debugsource-12.5-lp151.10.1
postgresql12-devel-12.5-lp151.10.1
postgresql12-devel-debuginfo-12.5-lp151.10.1
postgresql12-llvmjit-12.5-lp151.10.1
postgresql12-llvmjit-debuginfo-12.5-lp151.10.1
postgresql12-plperl-12.5-lp151.10.1
postgresql12-plperl-debuginfo-12.5-lp151.10.1
postgresql12-plpython-12.5-lp151.10.1
postgresql12-plpython-debuginfo-12.5-lp151.10.1
postgresql12-pltcl-12.5-lp151.10.1
postgresql12-pltcl-debuginfo-12.5-lp151.10.1
postgresql12-server-12.5-lp151.10.1
postgresql12-server-debuginfo-12.5-lp151.10.1
postgresql12-server-devel-12.5-lp151.10.1
postgresql12-server-devel-debuginfo-12.5-lp151.10.1
postgresql12-test-12.5-lp151.10.1

– openSUSE Leap 15.1 (noarch):

postgresql12-docs-12.5-lp151.10.1

References:

https://www.suse.com/security/cve/CVE-2020-25694.html
https://www.suse.com/security/cve/CVE-2020-25695.html
https://www.suse.com/security/cve/CVE-2020-25696.html
https://bugzilla.suse.com/1178666
https://bugzilla.suse.com/1178667
https://bugzilla.suse.com/1178668
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

openSUSE Security Update: Security update for postgresql12
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:2018-1
Rating: important
References: #1178666 #1178667 #1178668
Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696

Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for postgresql12 fixes the following issues:

– Upgrade to version 12.5:
* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR … WITH HOLD and
firing of deferred triggers within index expressions and materialized
view queries.
* CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb.
b) When psql’s \connect command re-uses connection parameters, ensure
that all non-overridden parameters from a previous connection string
are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql’s \gset command from
modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA is not
observing daylight savings time.
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-2018=1

Package List:

– openSUSE Leap 15.2 (i586 x86_64):

libecpg6-12.5-lp152.3.10.1
libecpg6-debuginfo-12.5-lp152.3.10.1
libpq5-12.5-lp152.3.10.1
libpq5-debuginfo-12.5-lp152.3.10.1
postgresql12-12.5-lp152.3.10.1
postgresql12-contrib-12.5-lp152.3.10.1
postgresql12-contrib-debuginfo-12.5-lp152.3.10.1
postgresql12-debuginfo-12.5-lp152.3.10.1
postgresql12-debugsource-12.5-lp152.3.10.1
postgresql12-devel-12.5-lp152.3.10.1
postgresql12-devel-debuginfo-12.5-lp152.3.10.1
postgresql12-llvmjit-12.5-lp152.3.10.1
postgresql12-llvmjit-debuginfo-12.5-lp152.3.10.1
postgresql12-plperl-12.5-lp152.3.10.1
postgresql12-plperl-debuginfo-12.5-lp152.3.10.1
postgresql12-plpython-12.5-lp152.3.10.1
postgresql12-plpython-debuginfo-12.5-lp152.3.10.1
postgresql12-pltcl-12.5-lp152.3.10.1
postgresql12-pltcl-debuginfo-12.5-lp152.3.10.1
postgresql12-server-12.5-lp152.3.10.1
postgresql12-server-debuginfo-12.5-lp152.3.10.1
postgresql12-server-devel-12.5-lp152.3.10.1
postgresql12-server-devel-debuginfo-12.5-lp152.3.10.1
postgresql12-test-12.5-lp152.3.10.1

– openSUSE Leap 15.2 (x86_64):

libecpg6-32bit-12.5-lp152.3.10.1
libecpg6-32bit-debuginfo-12.5-lp152.3.10.1
libpq5-32bit-12.5-lp152.3.10.1
libpq5-32bit-debuginfo-12.5-lp152.3.10.1

– openSUSE Leap 15.2 (noarch):

postgresql12-docs-12.5-lp152.3.10.1

References:

https://www.suse.com/security/cve/CVE-2020-25694.html
https://www.suse.com/security/cve/CVE-2020-25695.html
https://www.suse.com/security/cve/CVE-2020-25696.html
https://bugzilla.suse.com/1178666
https://bugzilla.suse.com/1178667
https://bugzilla.suse.com/1178668
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

openSUSE Security Update: Security update for postgresql10
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:2019-1
Rating: important
References: #1178666 #1178667 #1178668
Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696

Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for postgresql10 fixes the following issues:

– Upgrade to version 10.15:
* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR … WITH HOLD and
firing of deferred triggers within index expressions and materialized
view queries.
* CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb.
b) When psql’s \connect command re-uses connection parameters, ensure
that all non-overridden parameters from a previous connection string
are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql’s \gset command from
modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA is not
observing daylight savings time.
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/10/release-10-15.html

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.2:

zypper in -t patch openSUSE-2020-2019=1

Package List:

– openSUSE Leap 15.2 (i586 x86_64):

postgresql10-10.15-lp152.2.9.1
postgresql10-contrib-10.15-lp152.2.9.1
postgresql10-contrib-debuginfo-10.15-lp152.2.9.1
postgresql10-debuginfo-10.15-lp152.2.9.1
postgresql10-debugsource-10.15-lp152.2.9.1
postgresql10-devel-10.15-lp152.2.9.1
postgresql10-devel-debuginfo-10.15-lp152.2.9.1
postgresql10-plperl-10.15-lp152.2.9.1
postgresql10-plperl-debuginfo-10.15-lp152.2.9.1
postgresql10-plpython-10.15-lp152.2.9.1
postgresql10-plpython-debuginfo-10.15-lp152.2.9.1
postgresql10-pltcl-10.15-lp152.2.9.1
postgresql10-pltcl-debuginfo-10.15-lp152.2.9.1
postgresql10-server-10.15-lp152.2.9.1
postgresql10-server-debuginfo-10.15-lp152.2.9.1
postgresql10-test-10.15-lp152.2.9.1

– openSUSE Leap 15.2 (noarch):

postgresql10-docs-10.15-lp152.2.9.1

References:

https://www.suse.com/security/cve/CVE-2020-25694.html
https://www.suse.com/security/cve/CVE-2020-25695.html
https://www.suse.com/security/cve/CVE-2020-25696.html
https://bugzilla.suse.com/1178666
https://bugzilla.suse.com/1178667
https://bugzilla.suse.com/1178668
_______________________________________________
openSUSE Security Announce mailing list — security-announce@lists.opensuse.org
To unsubscribe, email security-announce-leave@lists.opensuse.org
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org

Autor161.53.13.146
Cert idNCERT-REF-2020-11-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa atftp

Otkriveni su sigurnosni nedostaci u programskom paketu atftp za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja...

Close