SUSE-SU-2021:1785-1: moderate: Security update for postgresql13

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu May 27 19:23:38 UTC 2021


   SUSE Security Update: Security update for postgresql13
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:1785-1
Rating:             moderate
References:         #1179945 #1183118 #1183168 #1185924 #1185925 
                    #1185926 
Cross-References:   CVE-2021-32027 CVE-2021-32028 CVE-2021-32029
                   
CVSS scores:
                    CVE-2021-32027 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
                    CVE-2021-32028 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
                    CVE-2021-32029 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP3
                    SUSE Linux Enterprise Module for Server Applications 15-SP2
                    SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
                    SUSE Linux Enterprise Module for Basesystem 15-SP3
                    SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has three
   fixes is now available.

Description:

   This update for postgresql13 fixes the following issues:

   - Upgrade to version 13.3:
   - CVE-2021-32027: Fixed integer overflows in array subscripting
     calculations (bsc#1185924).
   - CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON
     CONFLICT ... UPDATE target lists (bsc#1185925).
   - CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ...
     RETURNING outputs for joined cross-partition updates (bsc#1185926).

   - Don't use %_stop_on_removal, because it was meant to be private and got
     removed from openSUSE. %_restart_on_update is also private, but still
     supported and needed for now (bsc#1183168).
   - Re-enable build of the llvmjit subpackage on SLE, but it will only be
     delivered on PackageHub for now (bsc#1183118).
   - Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2021-1785=1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-1785=1

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1785=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-1785=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1785=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):

      libecpg6-13.3-5.10.1
      libecpg6-debuginfo-13.3-5.10.1
      postgresql13-contrib-13.3-5.10.1
      postgresql13-contrib-debuginfo-13.3-5.10.1
      postgresql13-debuginfo-13.3-5.10.1
      postgresql13-debugsource-13.3-5.10.1
      postgresql13-devel-13.3-5.10.1
      postgresql13-devel-debuginfo-13.3-5.10.1
      postgresql13-plperl-13.3-5.10.1
      postgresql13-plperl-debuginfo-13.3-5.10.1
      postgresql13-plpython-13.3-5.10.1
      postgresql13-plpython-debuginfo-13.3-5.10.1
      postgresql13-pltcl-13.3-5.10.1
      postgresql13-pltcl-debuginfo-13.3-5.10.1
      postgresql13-server-13.3-5.10.1
      postgresql13-server-debuginfo-13.3-5.10.1
      postgresql13-server-devel-13.3-5.10.1
      postgresql13-server-devel-debuginfo-13.3-5.10.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):

      postgresql13-docs-13.3-5.10.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      libecpg6-13.3-5.10.1
      libecpg6-debuginfo-13.3-5.10.1
      postgresql13-contrib-13.3-5.10.1
      postgresql13-contrib-debuginfo-13.3-5.10.1
      postgresql13-debuginfo-13.3-5.10.1
      postgresql13-debugsource-13.3-5.10.1
      postgresql13-devel-13.3-5.10.1
      postgresql13-devel-debuginfo-13.3-5.10.1
      postgresql13-plperl-13.3-5.10.1
      postgresql13-plperl-debuginfo-13.3-5.10.1
      postgresql13-plpython-13.3-5.10.1
      postgresql13-plpython-debuginfo-13.3-5.10.1
      postgresql13-pltcl-13.3-5.10.1
      postgresql13-pltcl-debuginfo-13.3-5.10.1
      postgresql13-server-13.3-5.10.1
      postgresql13-server-debuginfo-13.3-5.10.1
      postgresql13-server-devel-13.3-5.10.1
      postgresql13-server-devel-debuginfo-13.3-5.10.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):

      postgresql13-docs-13.3-5.10.1

   - SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64 ppc64le s390x x86_64):

      postgresql13-test-13.3-5.10.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):

      libpq5-13.3-5.10.1
      libpq5-debuginfo-13.3-5.10.1
      postgresql13-13.3-5.10.1
      postgresql13-debuginfo-13.3-5.10.1
      postgresql13-debugsource-13.3-5.10.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):

      libpq5-13.3-5.10.1
      libpq5-debuginfo-13.3-5.10.1
      postgresql13-13.3-5.10.1
      postgresql13-debuginfo-13.3-5.10.1
      postgresql13-debugsource-13.3-5.10.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):

      libpq5-32bit-13.3-5.10.1
      libpq5-32bit-debuginfo-13.3-5.10.1


References:

   https://www.suse.com/security/cve/CVE-2021-32027.html
   https://www.suse.com/security/cve/CVE-2021-32028.html
   https://www.suse.com/security/cve/CVE-2021-32029.html
   https://bugzilla.suse.com/1179945
   https://bugzilla.suse.com/1183118
   https://bugzilla.suse.com/1183168
   https://bugzilla.suse.com/1185924
   https://bugzilla.suse.com/1185925
   https://bugzilla.suse.com/1185926



More information about the sle-updates mailing list