openSUSE Security Update: postgresql92: update to 9.2.7 security release ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:0345-1 Rating: moderate References: #864845 #864846 #864847 #864850 #864851 #864852 #864853 Cross-References: CVE-2014-0060 CVE-2014-0061 CVE-2014-0062 CVE-2014-0063 CVE-2014-0064 CVE-2014-0065 CVE-2014-0066 CVE-2014-0067 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: The PostgreSQL database was updated to the security and bugfix release 9.2.7, which following fixes: * Shore up GRANT ... WITH ADMIN OPTION restrictions (CVE-2014-0060, bnc#864845) * Prevent privilege escalation via manual calls to PL validator functions (CVE-2014-0061, bnc#864846) * Avoid multiple name lookups during table and index DDL (CVE-2014-0062, bnc#864847) * Prevent buffer overrun with long datetime strings (CVE-2014-0063, bnc#864850) * Prevent buffer overrun due to integer overflow in size calculations (CVE-2014-0064, bnc#864851) * Prevent overruns of fixed-size buffers (CVE-2014-0065, bnc#864852) * Avoid crashing if crypt() returns NULL (CVE-2014-0066, bnc#864853) * Document risks of make check in the regression testing instructions (CVE-2014-0067) * For the other (many!) bug fixes, see the release notes: http://www.postgresql.org/docs/9.3/static/release-9-2-7.html Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.1: zypper in -t patch openSUSE-2014-192 - openSUSE 12.3: zypper in -t patch openSUSE-2014-192 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.1 (i586 x86_64): libecpg6-9.2.7-4.4.1 libecpg6-debuginfo-9.2.7-4.4.1 libpq5-9.2.7-4.4.1 libpq5-debuginfo-9.2.7-4.4.1 postgresql92-9.2.7-4.4.1 postgresql92-contrib-9.2.7-4.4.1 postgresql92-contrib-debuginfo-9.2.7-4.4.1 postgresql92-debuginfo-9.2.7-4.4.1 postgresql92-debugsource-9.2.7-4.4.1 postgresql92-devel-9.2.7-4.4.1 postgresql92-devel-debuginfo-9.2.7-4.4.1 postgresql92-libs-debugsource-9.2.7-4.4.1 postgresql92-plperl-9.2.7-4.4.1 postgresql92-plperl-debuginfo-9.2.7-4.4.1 postgresql92-plpython-9.2.7-4.4.1 postgresql92-plpython-debuginfo-9.2.7-4.4.1 postgresql92-pltcl-9.2.7-4.4.1 postgresql92-pltcl-debuginfo-9.2.7-4.4.1 postgresql92-server-9.2.7-4.4.1 postgresql92-server-debuginfo-9.2.7-4.4.1 - openSUSE 13.1 (x86_64): libecpg6-32bit-9.2.7-4.4.1 libecpg6-debuginfo-32bit-9.2.7-4.4.1 libpq5-32bit-9.2.7-4.4.1 libpq5-debuginfo-32bit-9.2.7-4.4.1 - openSUSE 13.1 (noarch): postgresql92-docs-9.2.7-4.4.1 - openSUSE 12.3 (i586 x86_64): libecpg6-9.2.7-1.12.1 libecpg6-debuginfo-9.2.7-1.12.1 libpq5-9.2.7-1.12.1 libpq5-debuginfo-9.2.7-1.12.1 postgresql92-9.2.7-1.12.1 postgresql92-contrib-9.2.7-1.12.1 postgresql92-contrib-debuginfo-9.2.7-1.12.1 postgresql92-debuginfo-9.2.7-1.12.1 postgresql92-debugsource-9.2.7-1.12.1 postgresql92-devel-9.2.7-1.12.1 postgresql92-devel-debuginfo-9.2.7-1.12.1 postgresql92-libs-debugsource-9.2.7-1.12.1 postgresql92-plperl-9.2.7-1.12.1 postgresql92-plperl-debuginfo-9.2.7-1.12.1 postgresql92-plpython-9.2.7-1.12.1 postgresql92-plpython-debuginfo-9.2.7-1.12.1 postgresql92-pltcl-9.2.7-1.12.1 postgresql92-pltcl-debuginfo-9.2.7-1.12.1 postgresql92-server-9.2.7-1.12.1 postgresql92-server-debuginfo-9.2.7-1.12.1 - openSUSE 12.3 (x86_64): libecpg6-32bit-9.2.7-1.12.1 libecpg6-debuginfo-32bit-9.2.7-1.12.1 libpq5-32bit-9.2.7-1.12.1 libpq5-debuginfo-32bit-9.2.7-1.12.1 - openSUSE 12.3 (noarch): postgresql92-docs-9.2.7-1.12.1 References: http://support.novell.com/security/cve/CVE-2014-0060.html http://support.novell.com/security/cve/CVE-2014-0061.html http://support.novell.com/security/cve/CVE-2014-0062.html http://support.novell.com/security/cve/CVE-2014-0063.html http://support.novell.com/security/cve/CVE-2014-0064.html http://support.novell.com/security/cve/CVE-2014-0065.html http://support.novell.com/security/cve/CVE-2014-0066.html http://support.novell.com/security/cve/CVE-2014-0067.html https://bugzilla.novell.com/864845 https://bugzilla.novell.com/864846 https://bugzilla.novell.com/864847 https://bugzilla.novell.com/864850 https://bugzilla.novell.com/864851 https://bugzilla.novell.com/864852 https://bugzilla.novell.com/864853