Mailinglist Archive: opensuse-updates (102 mails)

< Previous Next >
openSUSE-SU-2014:0345-1: moderate: postgresql92: update to 9.2.7 security release
openSUSE Security Update: postgresql92: update to 9.2.7 security release
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0345-1
Rating: moderate
References: #864845 #864846 #864847 #864850 #864851 #864852
#864853
Cross-References: CVE-2014-0060 CVE-2014-0061 CVE-2014-0062
CVE-2014-0063 CVE-2014-0064 CVE-2014-0065
CVE-2014-0066 CVE-2014-0067
Affected Products:
openSUSE 13.1
openSUSE 12.3
______________________________________________________________________________

An update that fixes 8 vulnerabilities is now available.

Description:


The PostgreSQL database was updated to the security and
bugfix release 9.2.7, which following fixes:

* Shore up GRANT ... WITH ADMIN OPTION restrictions
(CVE-2014-0060, bnc#864845)
* Prevent privilege escalation via manual calls to PL
validator functions (CVE-2014-0061, bnc#864846)
* Avoid multiple name lookups during table and index DDL
(CVE-2014-0062, bnc#864847)
* Prevent buffer overrun with long datetime strings
(CVE-2014-0063, bnc#864850)
* Prevent buffer overrun due to integer overflow in size
calculations (CVE-2014-0064, bnc#864851)
* Prevent overruns of fixed-size buffers (CVE-2014-0065,
bnc#864852)
* Avoid crashing if crypt() returns NULL (CVE-2014-0066,
bnc#864853)
* Document risks of make check in the regression testing
instructions (CVE-2014-0067)
* For the other (many!) bug fixes, see the release notes:
http://www.postgresql.org/docs/9.3/static/release-9-2-7.html



Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-192

- openSUSE 12.3:

zypper in -t patch openSUSE-2014-192

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

libecpg6-9.2.7-4.4.1
libecpg6-debuginfo-9.2.7-4.4.1
libpq5-9.2.7-4.4.1
libpq5-debuginfo-9.2.7-4.4.1
postgresql92-9.2.7-4.4.1
postgresql92-contrib-9.2.7-4.4.1
postgresql92-contrib-debuginfo-9.2.7-4.4.1
postgresql92-debuginfo-9.2.7-4.4.1
postgresql92-debugsource-9.2.7-4.4.1
postgresql92-devel-9.2.7-4.4.1
postgresql92-devel-debuginfo-9.2.7-4.4.1
postgresql92-libs-debugsource-9.2.7-4.4.1
postgresql92-plperl-9.2.7-4.4.1
postgresql92-plperl-debuginfo-9.2.7-4.4.1
postgresql92-plpython-9.2.7-4.4.1
postgresql92-plpython-debuginfo-9.2.7-4.4.1
postgresql92-pltcl-9.2.7-4.4.1
postgresql92-pltcl-debuginfo-9.2.7-4.4.1
postgresql92-server-9.2.7-4.4.1
postgresql92-server-debuginfo-9.2.7-4.4.1

- openSUSE 13.1 (x86_64):

libecpg6-32bit-9.2.7-4.4.1
libecpg6-debuginfo-32bit-9.2.7-4.4.1
libpq5-32bit-9.2.7-4.4.1
libpq5-debuginfo-32bit-9.2.7-4.4.1

- openSUSE 13.1 (noarch):

postgresql92-docs-9.2.7-4.4.1

- openSUSE 12.3 (i586 x86_64):

libecpg6-9.2.7-1.12.1
libecpg6-debuginfo-9.2.7-1.12.1
libpq5-9.2.7-1.12.1
libpq5-debuginfo-9.2.7-1.12.1
postgresql92-9.2.7-1.12.1
postgresql92-contrib-9.2.7-1.12.1
postgresql92-contrib-debuginfo-9.2.7-1.12.1
postgresql92-debuginfo-9.2.7-1.12.1
postgresql92-debugsource-9.2.7-1.12.1
postgresql92-devel-9.2.7-1.12.1
postgresql92-devel-debuginfo-9.2.7-1.12.1
postgresql92-libs-debugsource-9.2.7-1.12.1
postgresql92-plperl-9.2.7-1.12.1
postgresql92-plperl-debuginfo-9.2.7-1.12.1
postgresql92-plpython-9.2.7-1.12.1
postgresql92-plpython-debuginfo-9.2.7-1.12.1
postgresql92-pltcl-9.2.7-1.12.1
postgresql92-pltcl-debuginfo-9.2.7-1.12.1
postgresql92-server-9.2.7-1.12.1
postgresql92-server-debuginfo-9.2.7-1.12.1

- openSUSE 12.3 (x86_64):

libecpg6-32bit-9.2.7-1.12.1
libecpg6-debuginfo-32bit-9.2.7-1.12.1
libpq5-32bit-9.2.7-1.12.1
libpq5-debuginfo-32bit-9.2.7-1.12.1

- openSUSE 12.3 (noarch):

postgresql92-docs-9.2.7-1.12.1


References:

http://support.novell.com/security/cve/CVE-2014-0060.html
http://support.novell.com/security/cve/CVE-2014-0061.html
http://support.novell.com/security/cve/CVE-2014-0062.html
http://support.novell.com/security/cve/CVE-2014-0063.html
http://support.novell.com/security/cve/CVE-2014-0064.html
http://support.novell.com/security/cve/CVE-2014-0065.html
http://support.novell.com/security/cve/CVE-2014-0066.html
http://support.novell.com/security/cve/CVE-2014-0067.html
https://bugzilla.novell.com/864845
https://bugzilla.novell.com/864846
https://bugzilla.novell.com/864847
https://bugzilla.novell.com/864850
https://bugzilla.novell.com/864851
https://bugzilla.novell.com/864852
https://bugzilla.novell.com/864853


< Previous Next >
This Thread
  • No further messages