Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in PostgreSQL
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in PostgreSQL
ID: openSUSE-SU-2016:0578-1
Distribution: SUSE
Plattformen: openSUSE Leap 42.1
Datum: Do, 25. Februar 2016, 14:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772
Applikationen: PostgreSQL

Originalnachricht

   openSUSE Security Update: Security update for postgresql94
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:0578-1
Rating: important
References: #578053 #966435 #966436
Cross-References: CVE-2007-4772 CVE-2016-0766 CVE-2016-0773

Affected Products:
openSUSE Leap 42.1
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:


This update for postgresql94 fixes the following issues:

- Security and bugfix release 9.4.6:
* *** IMPORTANT *** Users of version 9.4 will need to reindex any
jsonb_path_ops indexes they have created, in order to fix a persistent
issue with missing index entries.
* Fix infinite loops and buffer-overrun problems in regular expressions
(CVE-2016-0773, bsc#966436).
* Fix regular-expression compiler to handle loops of constraint arcs
(CVE-2007-4772).
* Prevent certain PL/Java parameters from being set by non-superusers
(CVE-2016-0766, bsc#966435).
* Fix many issues in pg_dump with specific object types
* Prevent over-eager pushdown of HAVING clauses for GROUPING SETS
* Fix deparsing error with ON CONFLICT ... WHERE clauses
* Fix tableoid errors for postgres_fdw
* Prevent floating-point exceptions in pgbench
* Make \det search Foreign Table names consistently
* Fix quoting of domain constraint names in pg_dump
* Prevent putting expanded objects into Const nodes
* Allow compile of PL/Java on Windows
* Fix "unresolved symbol" errors in PL/Python execution
* Allow Python2 and Python3 to be used in the same database
* Add support for Python 3.5 in PL/Python
* Fix issue with subdirectory creation during initdb
* Make pg_ctl report status correctly on Windows
* Suppress confusing error when using pg_receivexlog with older servers
* Multiple documentation corrections and additions
* Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:
http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- PL/Perl still needs to be linked with rpath, so that it can find
libperl.so at runtime. bsc#578053, postgresql-plperl-keep-rpath.patch

This update was imported from the SUSE:SLE-12:Update update project.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE Leap 42.1:

zypper in -t patch openSUSE-2016-271=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE Leap 42.1 (i586 x86_64):

libecpg6-9.4.6-4.1
libecpg6-debuginfo-9.4.6-4.1
libpq5-9.4.6-4.1
libpq5-debuginfo-9.4.6-4.1
postgresql94-9.4.6-4.1
postgresql94-contrib-9.4.6-4.1
postgresql94-contrib-debuginfo-9.4.6-4.1
postgresql94-debuginfo-9.4.6-4.1
postgresql94-debugsource-9.4.6-4.1
postgresql94-devel-9.4.6-4.1
postgresql94-devel-debuginfo-9.4.6-4.1
postgresql94-libs-debugsource-9.4.6-4.1
postgresql94-plperl-9.4.6-4.1
postgresql94-plperl-debuginfo-9.4.6-4.1
postgresql94-plpython-9.4.6-4.1
postgresql94-plpython-debuginfo-9.4.6-4.1
postgresql94-pltcl-9.4.6-4.1
postgresql94-pltcl-debuginfo-9.4.6-4.1
postgresql94-server-9.4.6-4.1
postgresql94-server-debuginfo-9.4.6-4.1
postgresql94-test-9.4.6-4.1

- openSUSE Leap 42.1 (x86_64):

libecpg6-32bit-9.4.6-4.1
libecpg6-debuginfo-32bit-9.4.6-4.1
libpq5-32bit-9.4.6-4.1
libpq5-debuginfo-32bit-9.4.6-4.1

- openSUSE Leap 42.1 (noarch):

postgresql94-docs-9.4.6-4.1


References:

https://www.suse.com/security/cve/CVE-2007-4772.html
https://www.suse.com/security/cve/CVE-2016-0766.html
https://www.suse.com/security/cve/CVE-2016-0773.html
https://bugzilla.suse.com/578053
https://bugzilla.suse.com/966435
https://bugzilla.suse.com/966436

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung