Announcement ID: | SUSE-SU-2023:4454-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has two security fixes can now be installed.
This update for postgresql12 fixes the following issues:
Security issues fixed:
CVE-2023-5870: Prevent the pg_signal_backend role from signalling background workers and autovacuum processes. The documentation says that pg_signal_backend cannot issue signals to superuser-owned processes. It was able to signal these background processes, though, because they advertise a role OID of zero. Treat that as indicating superuser ownership. The security implications of cancelling one of these process types are fairly small so far as the core code goes (we'll just start another one), but extensions might add background workers that are more vulnerable. Also ensure that the is_superuser parameter is set correctly in such processes. No specific security consequences are known for that oversight, but it might be significant for some extensions. (bsc#1216960)
Updated to 12.17: https://www.postgresql.org/docs/12/release-12-17.html
Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package.
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
zypper in -t patch openSUSE-SLE-15.4-2023-4454=1
zypper in -t patch openSUSE-SLE-15.5-2023-4454=1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-4454=1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-4454=1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-4454=1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-4454=1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-4454=1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-4454=1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-4454=1
zypper in -t patch SUSE-Storage-7.1-2023-4454=1