SUSE-SU-2021:1784-1: moderate: Security update for postgresql13

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu May 27 19:21:02 UTC 2021


   SUSE Security Update: Security update for postgresql13
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:1784-1
Rating:             moderate
References:         #1179945 #1183118 #1183168 #1185924 #1185925 
                    #1185926 
Cross-References:   CVE-2021-32027 CVE-2021-32028 CVE-2021-32029
                   
CVSS scores:
                    CVE-2021-32027 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2021-32028 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-32029 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

   An update that solves three vulnerabilities and has three
   fixes is now available.

Description:

   This update for postgresql13 fixes the following issues:

   - Upgrade to version 13.3:
   - CVE-2021-32027: Fixed integer overflows in array subscripting
     calculations (bsc#1185924).
   - CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON
     CONFLICT ... UPDATE target lists (bsc#1185925).
   - CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ...
     RETURNING "pg_psql_temporary_savepoint" does not exist (bsc#1185926).

   - Don't use %_stop_on_removal, because it was meant to be private and got
     removed from openSUSE. %_restart_on_update is also private, but still
     supported and needed for now (bsc#1183168).
   - Re-enable build of the llvmjit subpackage on SLE, but it will only be
     delivered on PackageHub for now (bsc#1183118).
   - Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-1784=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-1784=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      postgresql13-debugsource-13.3-3.9.2
      postgresql13-debugsource-13.3-3.9.3
      postgresql13-devel-13.3-3.9.3
      postgresql13-devel-debuginfo-13.3-3.9.3

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (ppc64le s390x x86_64):

      postgresql13-server-devel-13.3-3.9.3
      postgresql13-server-devel-debuginfo-13.3-3.9.3

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      libecpg6-13.3-3.9.3
      libecpg6-debuginfo-13.3-3.9.3
      libpq5-13.3-3.9.3
      libpq5-debuginfo-13.3-3.9.3
      postgresql13-13.3-3.9.3
      postgresql13-contrib-13.3-3.9.3
      postgresql13-contrib-debuginfo-13.3-3.9.3
      postgresql13-debuginfo-13.3-3.9.3
      postgresql13-debugsource-13.3-3.9.2
      postgresql13-debugsource-13.3-3.9.3
      postgresql13-plperl-13.3-3.9.3
      postgresql13-plperl-debuginfo-13.3-3.9.3
      postgresql13-plpython-13.3-3.9.3
      postgresql13-plpython-debuginfo-13.3-3.9.3
      postgresql13-pltcl-13.3-3.9.3
      postgresql13-pltcl-debuginfo-13.3-3.9.3
      postgresql13-server-13.3-3.9.3
      postgresql13-server-debuginfo-13.3-3.9.3

   - SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):

      libpq5-32bit-13.3-3.9.3
      libpq5-debuginfo-32bit-13.3-3.9.3

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      postgresql13-docs-13.3-3.9.3


References:

   https://www.suse.com/security/cve/CVE-2021-32027.html
   https://www.suse.com/security/cve/CVE-2021-32028.html
   https://www.suse.com/security/cve/CVE-2021-32029.html
   https://bugzilla.suse.com/1179945
   https://bugzilla.suse.com/1183118
   https://bugzilla.suse.com/1183168
   https://bugzilla.suse.com/1185924
   https://bugzilla.suse.com/1185925
   https://bugzilla.suse.com/1185926



More information about the sle-security-updates mailing list