openSUSE-SU-2012:1299-1: moderate: postgresql: security and bugfix upgrade to 9.0.10
openSUSE Security Update: postgresql: security and bugfix upgrade to 9.0.10 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2012:1299-1 Rating: moderate References: #765069 #766799 #776523 #776524 Cross-References: CVE-2012-2143 CVE-2012-2655 CVE-2012-3488 CVE-2012-3489 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This version upgrade of PostgreSQL fixes following issues: - Bugfix release 9.0.10: * Fix planner's assignment of executor parameters, and fix executor's rescan logic for CTE plan nodes. * Improve page-splitting decisions in GiST indexes. * Fix cascading privilege revoke to stop if privileges are still held. * Improve error messages for Hot Standby misconfiguration errors. * Fix handling of SIGFPE when PL/Perl is in use. * Prevent PL/Perl from crashing if a recursive PL/Perl function is redefined while being executed. * Work around possible misoptimization in PL/Perl. - See also: http://www.postgresql.org/docs/9.0/static/release.html - Security and bugfix release 9.0.9: * Prevent access to external files/URLs via contrib/xml2 (CVE-2012-3488, bnc#776523). * Prevent access to external files/URLs via XML entity references (CVE-2012-3489, bnc#776524). * Fix incorrect password transformation in contrib/pgcrypto (CVE-2012-2143, bnc#766799). * Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (CVE-2012-2655, bnc#765069). - See also: http://www.postgresql.org/docs/9.0/static/release.html - Rename postgresql-mkspecfiles to pre_checkin.sh Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch openSUSE-2012-675 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): libecpg6-9.0.10-17.1 libecpg6-debuginfo-9.0.10-17.1 libpq5-9.0.10-17.1 libpq5-debuginfo-9.0.10-17.1 postgresql-9.0.10-17.1 postgresql-contrib-9.0.10-17.1 postgresql-contrib-debuginfo-9.0.10-17.1 postgresql-debuginfo-9.0.10-17.1 postgresql-debugsource-9.0.10-17.1 postgresql-devel-9.0.10-17.1 postgresql-devel-debuginfo-9.0.10-17.1 postgresql-libs-debugsource-9.0.10-17.1 postgresql-plperl-9.0.10-17.1 postgresql-plperl-debuginfo-9.0.10-17.1 postgresql-plpython-9.0.10-17.1 postgresql-plpython-debuginfo-9.0.10-17.1 postgresql-pltcl-9.0.10-17.1 postgresql-pltcl-debuginfo-9.0.10-17.1 postgresql-server-9.0.10-17.1 postgresql-server-debuginfo-9.0.10-17.1 - openSUSE 11.4 (x86_64): libpq5-32bit-9.0.10-17.1 libpq5-debuginfo-32bit-9.0.10-17.1 - openSUSE 11.4 (noarch): postgresql-docs-9.0.10-17.1 - openSUSE 11.4 (ia64): libpq5-debuginfo-x86-9.0.10-17.1 libpq5-x86-9.0.10-17.1 References: http://support.novell.com/security/cve/CVE-2012-2143.html http://support.novell.com/security/cve/CVE-2012-2655.html http://support.novell.com/security/cve/CVE-2012-3488.html http://support.novell.com/security/cve/CVE-2012-3489.html https://bugzilla.novell.com/765069 https://bugzilla.novell.com/766799 https://bugzilla.novell.com/776523 https://bugzilla.novell.com/776524
participants (1)
-
opensuse-security@opensuse.org