You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa postgresql93

Sigurnosni nedostaci programskog paketa postgresql93

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

SUSE Security Update: Security update for postgresql93
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:0539-1
Rating: important
References: #966435 #966436
Cross-References: CVE-2007-4772 CVE-2016-0766 CVE-2016-0773

Affected Products:
SUSE Linux Enterprise Software Development Kit 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

This update for postgresql93 fixes the following issues:

– Security and bugfix release 9.3.11:
* Fix infinite loops and buffer-overrun problems in regular expressions
(CVE-2016-0773, bsc#966436).
* Fix regular-expression compiler to handle loops of constraint arcs
(CVE-2007-4772).
* Prevent certain PL/Java parameters from being set by non-superusers
(CVE-2016-0766, bsc#966435).
* Fix many issues in pg_dump with specific object types
* Prevent over-eager pushdown of HAVING clauses for GROUPING SETS
* Fix deparsing error with ON CONFLICT … WHERE clauses
* Fix tableoid errors for postgres_fdw
* Prevent floating-point exceptions in pgbench
* Make \det search Foreign Table names consistently
* Fix quoting of domain constraint names in pg_dump
* Prevent putting expanded objects into Const nodes
* Allow compile of PL/Java on Windows
* Fix “unresolved symbol” errors in PL/Python execution
* Allow Python2 and Python3 to be used in the same database
* Add support for Python 3.5 in PL/Python
* Fix issue with subdirectory creation during initdb
* Make pg_ctl report status correctly on Windows
* Suppress confusing error when using pg_receivexlog with older servers
* Multiple documentation corrections and additions
* Fix erroneous hash calculations in gin_extract_jsonb_path()
– For the full release notse, see:
http://www.postgresql.org/docs/9.3/static/release-9-3-11.html

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Software Development Kit 12:

zypper in -t patch SUSE-SLE-SDK-12-2016-292=1

– SUSE Linux Enterprise Server 12:

zypper in -t patch SUSE-SLE-SERVER-12-2016-292=1

– SUSE Linux Enterprise Desktop 12:

zypper in -t patch SUSE-SLE-DESKTOP-12-2016-292=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

postgresql93-devel-9.3.11-14.1
postgresql93-devel-debuginfo-9.3.11-14.1
postgresql93-libs-debugsource-9.3.11-14.1

– SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

postgresql93-9.3.11-14.2
postgresql93-contrib-9.3.11-14.2
postgresql93-contrib-debuginfo-9.3.11-14.2
postgresql93-debuginfo-9.3.11-14.2
postgresql93-debugsource-9.3.11-14.2
postgresql93-server-9.3.11-14.2
postgresql93-server-debuginfo-9.3.11-14.2

– SUSE Linux Enterprise Server 12 (noarch):

postgresql93-docs-9.3.11-14.2

– SUSE Linux Enterprise Desktop 12 (x86_64):

postgresql93-9.3.11-14.2
postgresql93-debuginfo-9.3.11-14.2
postgresql93-debugsource-9.3.11-14.2

References:

https://www.suse.com/security/cve/CVE-2007-4772.html
https://www.suse.com/security/cve/CVE-2016-0766.html
https://www.suse.com/security/cve/CVE-2016-0773.html
https://bugzilla.suse.com/966435
https://bugzilla.suse.com/966436


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorMarijo Plepelic
Cert idNCERT-REF-2016-02-0011-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa libssh2

Otkriven je sigurnosni nedostatak u programskom paketu libssh2. Otkriveni nedostatak potencijalnim MITM napadačima omogućuje lakše dešifriranje i presretanje SSH sesija....

Close