SUSE-SU-2020:3463-1: important: Security update for postgresql12

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Nov 20 10:21:52 MST 2020


   SUSE Security Update: Security update for postgresql12
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:3463-1
Rating:             important
References:         #1178666 #1178667 #1178668 
Cross-References:   CVE-2020-25694 CVE-2020-25695 CVE-2020-25696
                   
Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP2
                    SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:

   This update for postgresql12 fixes the following issues:

   - Upgrade to version 12.5:
     * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD and
       firing of deferred triggers within index expressions and materialized
       view queries.
     * CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
       parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb.
       b) When psql's \connect command re-uses connection parameters, ensure
       that all non-overridden parameters from a previous connection string
       are re-used.
     * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
       modifying specially-treated variables.
     * Fix recently-added timetz test case so it works when the USA is not
       observing daylight savings time.
     * https://www.postgresql.org/about/news/2111/
     * https://www.postgresql.org/docs/12/release-12-5.html

   - Stop building the mini and lib packages as they are now coming from
     postgresql13.


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2020-3463=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-3463=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      libecpg6-12.5-8.10.1
      libecpg6-debuginfo-12.5-8.10.1
      postgresql12-contrib-12.5-8.10.1
      postgresql12-contrib-debuginfo-12.5-8.10.1
      postgresql12-debuginfo-12.5-8.10.1
      postgresql12-debugsource-12.5-8.10.1
      postgresql12-devel-12.5-8.10.1
      postgresql12-devel-debuginfo-12.5-8.10.1
      postgresql12-plperl-12.5-8.10.1
      postgresql12-plperl-debuginfo-12.5-8.10.1
      postgresql12-plpython-12.5-8.10.1
      postgresql12-plpython-debuginfo-12.5-8.10.1
      postgresql12-pltcl-12.5-8.10.1
      postgresql12-pltcl-debuginfo-12.5-8.10.1
      postgresql12-server-12.5-8.10.1
      postgresql12-server-debuginfo-12.5-8.10.1
      postgresql12-server-devel-12.5-8.10.1
      postgresql12-server-devel-debuginfo-12.5-8.10.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):

      postgresql12-docs-12.5-8.10.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):

      libpq5-12.5-8.10.1
      libpq5-debuginfo-12.5-8.10.1
      postgresql12-12.5-8.10.1
      postgresql12-debuginfo-12.5-8.10.1
      postgresql12-debugsource-12.5-8.10.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):

      libpq5-32bit-12.5-8.10.1
      libpq5-32bit-debuginfo-12.5-8.10.1


References:

   https://www.suse.com/security/cve/CVE-2020-25694.html
   https://www.suse.com/security/cve/CVE-2020-25695.html
   https://www.suse.com/security/cve/CVE-2020-25696.html
   https://bugzilla.suse.com/1178666
   https://bugzilla.suse.com/1178667
   https://bugzilla.suse.com/1178668



More information about the sle-security-updates mailing list