[security-announce] openSUSE-SU-2016:0531-1: important: Security update for postgresql93
openSUSE Security Update: Security update for postgresql93 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:0531-1 Rating: important References: #966435 #966436 Cross-References: CVE-2007-4772 CVE-2016-0766 CVE-2016-0773 Affected Products: openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for postgresql93 fixes the following issues: - Security and bugfix release 9.3.11: * Fix infinite loops and buffer-overrun problems in regular expressions (CVE-2016-0773, boo#966436). * Fix regular-expression compiler to handle loops of constraint arcs (CVE-2007-4772). * Prevent certain PL/Java parameters from being set by non-superusers (CVE-2016-0766, boo#966435). * Fix many issues in pg_dump with specific object types * Prevent over-eager pushdown of HAVING clauses for GROUPING SETS * Fix deparsing error with ON CONFLICT ... WHERE clauses * Fix tableoid errors for postgres_fdw * Prevent floating-point exceptions in pgbench * Make \det search Foreign Table names consistently * Fix quoting of domain constraint names in pg_dump * Prevent putting expanded objects into Const nodes * Allow compile of PL/Java on Windows * Fix "unresolved symbol" errors in PL/Python execution * Allow Python2 and Python3 to be used in the same database * Add support for Python 3.5 in PL/Python * Fix issue with subdirectory creation during initdb * Make pg_ctl report status correctly on Windows * Suppress confusing error when using pg_receivexlog with older servers * Multiple documentation corrections and additions * Fix erroneous hash calculations in gin_extract_jsonb_path() - For the full release notse, see: http://www.postgresql.org/docs/9.3/static/release-9-3-11.html Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-253=1 - openSUSE 13.2: zypper in -t patch openSUSE-2016-253=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): postgresql93-9.3.11-3.2 postgresql93-contrib-9.3.11-3.2 postgresql93-contrib-debuginfo-9.3.11-3.2 postgresql93-debuginfo-9.3.11-3.2 postgresql93-debugsource-9.3.11-3.2 postgresql93-devel-9.3.11-3.2 postgresql93-devel-debuginfo-9.3.11-3.2 postgresql93-libs-debugsource-9.3.11-3.2 postgresql93-plperl-9.3.11-3.2 postgresql93-plperl-debuginfo-9.3.11-3.2 postgresql93-plpython-9.3.11-3.2 postgresql93-plpython-debuginfo-9.3.11-3.2 postgresql93-pltcl-9.3.11-3.2 postgresql93-pltcl-debuginfo-9.3.11-3.2 postgresql93-server-9.3.11-3.2 postgresql93-server-debuginfo-9.3.11-3.2 postgresql93-test-9.3.11-3.2 - openSUSE Leap 42.1 (noarch): postgresql-init-9.4-6.1 postgresql93-docs-9.3.11-3.2 - openSUSE 13.2 (i586 x86_64): libecpg6-9.3.11-2.10.1 libecpg6-debuginfo-9.3.11-2.10.1 libpq5-9.3.11-2.10.1 libpq5-debuginfo-9.3.11-2.10.1 postgresql93-9.3.11-2.10.1 postgresql93-contrib-9.3.11-2.10.1 postgresql93-contrib-debuginfo-9.3.11-2.10.1 postgresql93-debuginfo-9.3.11-2.10.1 postgresql93-debugsource-9.3.11-2.10.1 postgresql93-devel-9.3.11-2.10.1 postgresql93-devel-debuginfo-9.3.11-2.10.1 postgresql93-libs-debugsource-9.3.11-2.10.1 postgresql93-plperl-9.3.11-2.10.1 postgresql93-plperl-debuginfo-9.3.11-2.10.1 postgresql93-plpython-9.3.11-2.10.1 postgresql93-plpython-debuginfo-9.3.11-2.10.1 postgresql93-pltcl-9.3.11-2.10.1 postgresql93-pltcl-debuginfo-9.3.11-2.10.1 postgresql93-server-9.3.11-2.10.1 postgresql93-server-debuginfo-9.3.11-2.10.1 postgresql93-test-9.3.11-2.10.1 - openSUSE 13.2 (x86_64): libecpg6-32bit-9.3.11-2.10.1 libecpg6-debuginfo-32bit-9.3.11-2.10.1 libpq5-32bit-9.3.11-2.10.1 libpq5-debuginfo-32bit-9.3.11-2.10.1 - openSUSE 13.2 (noarch): postgresql93-docs-9.3.11-2.10.1 References: https://www.suse.com/security/cve/CVE-2007-4772.html https://www.suse.com/security/cve/CVE-2016-0766.html https://www.suse.com/security/cve/CVE-2016-0773.html https://bugzilla.suse.com/966435 https://bugzilla.suse.com/966436 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
participants (1)
-
opensuse-security@opensuse.org