SUSE-SU-2016:0539-1: important: Security update for postgresql93

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon Feb 22 06:11:15 MST 2016


   SUSE Security Update: Security update for postgresql93
______________________________________________________________________________

Announcement ID:    SUSE-SU-2016:0539-1
Rating:             important
References:         #966435 #966436 
Cross-References:   CVE-2007-4772 CVE-2016-0766 CVE-2016-0773
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Linux Enterprise Desktop 12
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:


   This update for postgresql93 fixes the following issues:

   - Security and bugfix release 9.3.11:
     * Fix infinite loops and buffer-overrun problems in regular expressions
       (CVE-2016-0773, bsc#966436).
     * Fix regular-expression compiler to handle loops of constraint arcs
       (CVE-2007-4772).
     * Prevent certain PL/Java parameters from being set by non-superusers
       (CVE-2016-0766, bsc#966435).
     * Fix many issues in pg_dump with specific object types
     * Prevent over-eager pushdown of HAVING clauses for GROUPING SETS
     * Fix deparsing error with ON CONFLICT ... WHERE clauses
     * Fix tableoid errors for postgres_fdw
     * Prevent floating-point exceptions in pgbench
     * Make \det search Foreign Table names consistently
     * Fix quoting of domain constraint names in pg_dump
     * Prevent putting expanded objects into Const nodes
     * Allow compile of PL/Java on Windows
     * Fix "unresolved symbol" errors in PL/Python execution
     * Allow Python2 and Python3 to be used in the same database
     * Add support for Python 3.5 in PL/Python
     * Fix issue with subdirectory creation during initdb
     * Make pg_ctl report status correctly on Windows
     * Suppress confusing error when using pg_receivexlog with older servers
     * Multiple documentation corrections and additions
     * Fix erroneous hash calculations in gin_extract_jsonb_path()
   - For the full release notse, see:
     http://www.postgresql.org/docs/9.3/static/release-9-3-11.html


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2016-292=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2016-292=1

   - SUSE Linux Enterprise Desktop 12:

      zypper in -t patch SUSE-SLE-DESKTOP-12-2016-292=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      postgresql93-devel-9.3.11-14.1
      postgresql93-devel-debuginfo-9.3.11-14.1
      postgresql93-libs-debugsource-9.3.11-14.1

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      postgresql93-9.3.11-14.2
      postgresql93-contrib-9.3.11-14.2
      postgresql93-contrib-debuginfo-9.3.11-14.2
      postgresql93-debuginfo-9.3.11-14.2
      postgresql93-debugsource-9.3.11-14.2
      postgresql93-server-9.3.11-14.2
      postgresql93-server-debuginfo-9.3.11-14.2

   - SUSE Linux Enterprise Server 12 (noarch):

      postgresql93-docs-9.3.11-14.2

   - SUSE Linux Enterprise Desktop 12 (x86_64):

      postgresql93-9.3.11-14.2
      postgresql93-debuginfo-9.3.11-14.2
      postgresql93-debugsource-9.3.11-14.2


References:

   https://www.suse.com/security/cve/CVE-2007-4772.html
   https://www.suse.com/security/cve/CVE-2016-0766.html
   https://www.suse.com/security/cve/CVE-2016-0773.html
   https://bugzilla.suse.com/966435
   https://bugzilla.suse.com/966436



More information about the sle-security-updates mailing list