Mailinglist Archive: opensuse-security-announce (97 mails)

< Previous Next >
[security-announce] SUSE-SU-2016:0677-1: important: Security update for postgresql94
SUSE Security Update: Security update for postgresql94

Announcement ID: SUSE-SU-2016:0677-1
Rating: important
References: #949669 #949670 #966435 #966436
Cross-References: CVE-2007-4772 CVE-2015-5288 CVE-2015-5289
CVE-2016-0766 CVE-2016-0773
Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Desktop 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4

An update that fixes 5 vulnerabilities is now available.


This update for postgresql94 fixes the following issues:

- Security and bugfix release 9.4.6:
* *** IMPORTANT *** Users of version 9.4 will need to reindex any
jsonb_path_ops indexes they have created, in order to fix a persistent
issue with missing index entries.
* Fix infinite loops and buffer-overrun problems in regular expressions
(CVE-2016-0773, bsc#966436).
* Fix regular-expression compiler to handle loops of constraint arcs
* Prevent certain PL/Java parameters from being set by non-superusers
(CVE-2016-0766, bsc#966435).
* Fix many issues in pg_dump with specific object types
* Prevent over-eager pushdown of HAVING clauses for GROUPING SETS
* Fix deparsing error with ON CONFLICT ... WHERE clauses
* Fix tableoid errors for postgres_fdw
* Prevent floating-point exceptions in pgbench
* Make \det search Foreign Table names consistently
* Fix quoting of domain constraint names in pg_dump
* Prevent putting expanded objects into Const nodes
* Allow compile of PL/Java on Windows
* Fix "unresolved symbol" errors in PL/Python execution
* Allow Python2 and Python3 to be used in the same database
* Add support for Python 3.5 in PL/Python
* Fix issue with subdirectory creation during initdb
* Make pg_ctl report status correctly on Windows
* Suppress confusing error when using pg_receivexlog with older servers
* Multiple documentation corrections and additions
* Fix erroneous hash calculations in gin_extract_jsonb_path()
- For the full release notse, see:

- Security and bugfix release 9.4.5:
* CVE-2015-5289, bsc#949670: json or jsonb input values constructed from
arbitrary user input can crash the PostgreSQL server and cause a
denial of service.
* CVE-2015-5288, bsc#949669: The crypt() function included with the
optional pgCrypto extension could be exploited to read a few
additional bytes of memory. No working exploit for this issue has been
- For the full release notse, see:
- Relax dependency on libpq to major version.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11-SP4:

zypper in -t patch sdksp4-postgresql94-12440=1

- SUSE Linux Enterprise Server 11-SP4:

zypper in -t patch slessp4-postgresql94-12440=1

- SUSE Linux Enterprise Desktop 11-SP4:

zypper in -t patch sledsp4-postgresql94-12440=1

- SUSE Linux Enterprise Debuginfo 11-SP4:

zypper in -t patch dbgsp4-postgresql94-12440=1

To bring your system up-to-date, use "zypper patch".

Package List:

- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64
s390x x86_64):


- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):


- SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64):


- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):


- SUSE Linux Enterprise Desktop 11-SP4 (x86_64):


- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):



To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages