Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in postgresql
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in postgresql
ID: SUSE-SU-2021:1970-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Linux Enterprise Module for Server Applications 15-SP2, SUSE Linux Enterprise Module for Legacy Software 15-SP3
Datum: Mo, 14. Juni 2021, 23:03
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027
Applikationen: PostgreSQL

Originalnachricht


SUSE Security Update: Security update for postgresql10
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1970-1
Rating: moderate
References: #1183168 #1185924 #1185925
Cross-References: CVE-2021-32027 CVE-2021-32028
CVSS scores:
CVE-2021-32027 (NVD) : 8.8
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-32027 (SUSE): 6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-32028 (SUSE): 6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP2
SUSE Linux Enterprise Module for Legacy Software 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that solves two vulnerabilities and has one
errata is now available.

Description:

This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting
calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON
CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and
got
removed from openSUSE. %_restart_on_update is also private, but still
supported and needed for now (bsc#1183168).


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Server Applications 15-SP2:

zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-1970=1

- SUSE Linux Enterprise Module for Legacy Software 15-SP3:

zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2021-1970=1

- SUSE Linux Enterprise Module for Basesystem 15-SP2:

zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1970=1



Package List:

- SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64
ppc64le s390x x86_64):

postgresql10-contrib-10.17-8.35.1
postgresql10-contrib-debuginfo-10.17-8.35.1
postgresql10-debuginfo-10.17-8.35.1
postgresql10-debugsource-10.17-8.35.1
postgresql10-devel-10.17-8.35.1
postgresql10-devel-debuginfo-10.17-8.35.1
postgresql10-plperl-10.17-8.35.1
postgresql10-plperl-debuginfo-10.17-8.35.1
postgresql10-plpython-10.17-8.35.1
postgresql10-plpython-debuginfo-10.17-8.35.1
postgresql10-pltcl-10.17-8.35.1
postgresql10-pltcl-debuginfo-10.17-8.35.1
postgresql10-server-10.17-8.35.1
postgresql10-server-debuginfo-10.17-8.35.1

- SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):

postgresql10-docs-10.17-8.35.1

- SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le
s390x x86_64):

postgresql10-10.17-8.35.1
postgresql10-contrib-10.17-8.35.1
postgresql10-contrib-debuginfo-10.17-8.35.1
postgresql10-debuginfo-10.17-8.35.1
postgresql10-debugsource-10.17-8.35.1
postgresql10-devel-10.17-8.35.1
postgresql10-devel-debuginfo-10.17-8.35.1
postgresql10-plperl-10.17-8.35.1
postgresql10-plperl-debuginfo-10.17-8.35.1
postgresql10-plpython-10.17-8.35.1
postgresql10-plpython-debuginfo-10.17-8.35.1
postgresql10-pltcl-10.17-8.35.1
postgresql10-pltcl-debuginfo-10.17-8.35.1
postgresql10-server-10.17-8.35.1
postgresql10-server-debuginfo-10.17-8.35.1

- SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):

postgresql10-10.17-8.35.1
postgresql10-debuginfo-10.17-8.35.1
postgresql10-debugsource-10.17-8.35.1


References:

https://www.suse.com/security/cve/CVE-2021-32027.html
https://www.suse.com/security/cve/CVE-2021-32028.html
https://bugzilla.suse.com/1183168
https://bugzilla.suse.com/1185924
https://bugzilla.suse.com/1185925
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung