Описание
Recommended update for postgresql, postgresql10, postgresql12
This update for postgresql, postgresql10, postgresql12 fixes the following issues:
Changes in the postgresql wrapper package:
- Sync ownership of /run/postgresql in the file list with tmpfiles.
- Use the correct content for .bash_profile (bsc#1153168).
- Stop shipping SUSEfirewall2 config files (bsc#1151591).
- Use /run/postgresql instead of /var/run/postgresql in %ghost and postgresql-tmpfiles.conf to avoid rpmlint warnings and errors.
- add /var/run/postgresql to the filelist. as %ghost for systemd systems and directly for non systemd systems
Changes in postgresql10:
- packaging changed to no longer build the libraries, these now come from postgresql12.
Changes in postgresql12:
Initial package for the postgresql 12 branch
https://www.postgresql.org/about/news/1976/
-
Update to 12.2 (CVE-2020-1720) https://www.postgresql.org/about/news/2011/ https://www.postgresql.org/docs/12/release-12-2.html
-
Avoid the dependency from the devel package to the main package. devel packages are exclusive, thus ecpg does not require update-alternatives.
-
Remove unused build dependencies from the client libs package: LVM, icu, selinux, systemd.
-
Update to 12.1
https://www.postgresql.org/docs/12/release-12-1.html https://www.postgresql.org/about/news/1994/
-
add requires to the server-devel package for the libs that are returned by pg_config --libs
python-psycopg2 was updated to 2.8.4 to allow working with postgresql12.
Список пакетов
Container suse/manager/5.0/x86_64/server:latest
Container suse/postgres:10
Image SLES15-SP1-Manager-4-0-Azure-BYOS-Server
Image SLES15-SP1-Manager-4-0-EC2-HVM-BYOS-Server
Image SLES15-SP1-Manager-4-0-GCE-BYOS-Server
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
Image server-image
SUSE Linux Enterprise Module for Basesystem 15 SP1
SUSE Linux Enterprise Module for Server Applications 15 SP1
Ссылки
- Link for SUSE-RU-2020:1280-1
- E-Mail link for SUSE-RU-2020:1280-1
- SUSE Security Ratings
- SUSE Bug 1138034
- SUSE Bug 1151591
- SUSE Bug 1153168
- SUSE Bug 1163985
- SUSE Bug 1167541
- SUSE CVE CVE-2019-10164 page
- SUSE CVE CVE-2020-1720 page
Описание
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
Затронутые продукты
Ссылки
- CVE-2019-10164
- SUSE Bug 1138034
Описание
A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
Затронутые продукты
Ссылки
- CVE-2020-1720
- SUSE Bug 1163985