Security update for postgresql13
Announcement ID: | SUSE-SU-2021:1785-2 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has three security fixes can now be installed.
Description:
This update for postgresql13 fixes the following issues:
- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
-
CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).
-
Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP3
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1785=1
Package List:
-
SUSE Package Hub 15 15-SP3 (aarch64 ppc64le s390x x86_64)
- postgresql13-test-13.3-5.10.1
References:
- https://www.suse.com/security/cve/CVE-2021-32027.html
- https://www.suse.com/security/cve/CVE-2021-32028.html
- https://www.suse.com/security/cve/CVE-2021-32029.html
- https://bugzilla.suse.com/show_bug.cgi?id=1179945
- https://bugzilla.suse.com/show_bug.cgi?id=1183118
- https://bugzilla.suse.com/show_bug.cgi?id=1183168
- https://bugzilla.suse.com/show_bug.cgi?id=1185924
- https://bugzilla.suse.com/show_bug.cgi?id=1185925
- https://bugzilla.suse.com/show_bug.cgi?id=1185926