Security update for postgresql94
Announcement ID: | SUSE-SU-2017:2258-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities can now be installed.
Description:
Postgresql94 was updated to 9.4.13 to fix the following issues:
- CVE-2017-7547: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. (bsc#1051685)
- CVE-2017-7546: Disallow empty passwords in all password-based authentication methods. (bsc#1051684)
- CVE-2017-7548: lo_put() function ignores ACLs. (bsc#1053259)
The changelog for this release is here: https://www.postgresql.org/docs/9.4/static/release-9-4-13.html
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Point of Service 11 SP3
zypper in -t patch sleposp3-postgresql94-13247=1
-
SUSE Linux Enterprise Software Development Kit 11 SP4
zypper in -t patch sdksp4-postgresql94-13247=1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3
zypper in -t patch slessp3-postgresql94-13247=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-postgresql94-13247=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-postgresql94-13247=1
Package List:
-
SUSE Linux Enterprise Point of Service 11 SP3 (i586)
- postgresql94-server-9.4.13-0.23.5.1
- postgresql94-contrib-9.4.13-0.23.5.1
- postgresql94-docs-9.4.13-0.23.5.1
- libpq5-9.4.13-0.23.5.1
- libecpg6-9.4.13-0.23.5.1
- postgresql94-9.4.13-0.23.5.1
-
SUSE Linux Enterprise Software Development Kit 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- postgresql94-devel-9.4.13-0.23.5.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64 i586)
- postgresql94-server-9.4.13-0.23.5.1
- postgresql94-contrib-9.4.13-0.23.5.1
- postgresql94-docs-9.4.13-0.23.5.1
- libpq5-9.4.13-0.23.5.1
- libecpg6-9.4.13-0.23.5.1
- postgresql94-9.4.13-0.23.5.1
-
SUSE Linux Enterprise Server 11 SP3 LTSS 11-SP3 (s390x x86_64)
- libpq5-32bit-9.4.13-0.23.5.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- postgresql94-server-9.4.13-0.23.5.1
- postgresql94-contrib-9.4.13-0.23.5.1
- postgresql94-docs-9.4.13-0.23.5.1
- libpq5-9.4.13-0.23.5.1
- libecpg6-9.4.13-0.23.5.1
- postgresql94-9.4.13-0.23.5.1
-
SUSE Linux Enterprise Server 11 SP4 (ppc64 s390x x86_64)
- libpq5-32bit-9.4.13-0.23.5.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- postgresql94-server-9.4.13-0.23.5.1
- libpq5-32bit-9.4.13-0.23.5.1
- postgresql94-contrib-9.4.13-0.23.5.1
- postgresql94-docs-9.4.13-0.23.5.1
- libpq5-9.4.13-0.23.5.1
- libecpg6-9.4.13-0.23.5.1
- postgresql94-9.4.13-0.23.5.1
References:
- https://www.suse.com/security/cve/CVE-2017-7546.html
- https://www.suse.com/security/cve/CVE-2017-7547.html
- https://www.suse.com/security/cve/CVE-2017-7548.html
- https://bugzilla.suse.com/show_bug.cgi?id=1051684
- https://bugzilla.suse.com/show_bug.cgi?id=1051685
- https://bugzilla.suse.com/show_bug.cgi?id=1053259