Описание
Security update for postgresql96, postgresql10 and postgresql12
This update for postgresql96, postgresql10 and postgresql12 fixes the following issues:
postgresql10 was updated to 10.13 (bsc#1171924).
https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/10/release-10-13.html
postgresql10 was updated to 10.12 (CVE-2020-1720, bsc#1163985)
postgresql10 was updated to 10.11:
postgresql12 was updated to 12.3 (bsc#1171924).
Bug Fixes and Improvements:
- Several fixes for GENERATED columns, including an issue where it was possible to crash or corrupt data in a table when the output of the generated column was the exact copy of a physical column on the table, e.g. if the expression called a function which could return its own input.
- Several fixes for ALTER TABLE, including ensuring the SET STORAGE directive is propagated to a table's indexes.
- Fix a potential race condition when using DROP OWNED BY while another session is deleting the same objects.
- Allow for a partition to be detached when it has inherited ROW triggers.
- Several fixes for REINDEX CONCURRENTLY, particularly with issues when a REINDEX CONCURRENTLY operation fails.
- Fix crash when COLLATE is applied to an uncollatable type in a partition bound expression.
- Fix performance regression in floating point overflow/underflow detection.
- Several fixes for full text search, particularly with phrase searching.
- Fix query-lifespan memory leak for a set-returning function used in a query's FROM clause.
- Several reporting fixes for the output of VACUUM VERBOSE.
- Allow input of type circle to accept the format (x,y),r, which is specified in the documentation.
- Allow for the get_bit() and set_bit() functions to not fail on bytea strings longer than 256MB.
- Avoid premature recycling of WAL segments during crash recovery, which could lead to WAL segments being recycled before being archived.
- Avoid attempting to fetch nonexistent WAL files from archive storage during recovery by skipping irrelevant timelines.
- Several fixes for logical replication and replication slots.
- Fix several race conditions in synchronous standby management, including one that occurred when changing the synchronous_standby_names setting.
- Several fixes for GSSAPI support, include a fix for a memory leak that occurred when using GSSAPI encryption.
- Ensure that members of the pg_read_all_stats role can read all statistics views.
- Fix performance regression in information_schema.triggers view.
- Fix memory leak in libpq when using sslmode=verify-full.
- Fix crash in psql when attempting to re-establish a failed connection.
- Allow tab-completion of the filename argument to \gx command in psql.
- Add pg_dump support for ALTER ... DEPENDS ON EXTENSION.
- Several other fixes for pg_dump, which include dumping comments on RLS policies and postponing restore of event triggers until the end.
- Ensure pg_basebackup generates valid tar files.
- pg_checksums skips tablespace subdirectories that belong to a different PostgreSQL major version
- Several Windows compatibility fixes
This update also contains timezone tzdata release 2020a for DST law changes in Morocco and the Canadian Yukon, plus historical corrections for Shanghai. The America/Godthab zone has been renamed to America/Nuuk to reflect current English usage ; however, the old name remains available as a compatibility link. This also updates initdb's list of known Windows time zone names to include recent additions.
For more details, check out:
Other fixes:
- Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.
postgresql96 was updated to 9.6.19:
- CVE-2020-14350, boo#1175194: Make contrib modules' installation scripts more secure.
- https://www.postgresql.org/docs/9.6/release-9-6-19.html
-
Pack the /usr/lib/postgresql symlink only into the main package.
-
Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.
-
update to 9.6.18 (boo#1171924). https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/9.6/release-9-6-18.html
-
Unify the spec file to work across all current PostgreSQL versions to simplify future maintenance.
-
Move from the 'libs' build flavour to a 'mini' package that will only be used inside the build service and not get shipped, to avoid confusion with the debuginfo packages (boo#1148643).
-
update to 9.6.17 (CVE-2020-1720, boo#1163985) https://www.postgresql.org/about/news/2011/ https://www.postgresql.org/docs/9.6/release-9-6-17.html
-
use and package the sha256 checksum for for source
-
update to 9.6.16: https://www.postgresql.org/about/news/1994/ https://www.postgresql.org/docs/9.6/release-9-6-16.html
-
add requires to the devel package for the libs that are returned by pg_config --libs
-
Update to 9.6.15:
- https://www.postgresql.org/about/news/1960/
- https://www.postgresql.org/docs/9.6/release-9-6-15.html
- CVE-2019-10208, boo#1145092: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution.
-
Use FAT LTO objects in order to provide proper static library.
-
Update to 9.6.14: https://www.postgresql.org/docs/9.6/release-9-6-14.html
-
Update to 9.6.13:
- https://www.postgresql.org/docs/9.6/release-9-6-13.html
- https://www.postgresql.org/about/news/1939/
- CVE-2019-10130, boo#1134689: Prevent row-level security policies from being bypassed via selectivity estimators.
-
Make the server-devel package exclusive across versions.
-
Update to 9.6.12:
- https://www.postgresql.org/docs/9.6/release-9-6-12.html
- https://www.postgresql.org/about/news/1920/
- By default, panic instead of retrying after fsync() failure, to avoid possible data corruption.
- Numerous other bug fixes.
-
Overhaul README.SUSE
-
Update to 9.6.11:
- Numerous bug fixes, see the release notes: https://www.postgresql.org/docs/9.6/release-9-6-11.html
- Remove unneeded library dependencies from PGXS.
-
add provides for the new server-devel package that will be introduced in postgresql 11
-
Update to 9.6.10: https://www.postgresql.org/docs/current/static/release-9-6-10.html
- CVE-2018-10915, boo#1104199: Fix failure to reset libpq's state fully between connection attempts.
- CVE-2018-10925, boo#1104202: Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT * FROM ...
-
Update to 9.6.9: https://www.postgresql.org/about/news/1851/ https://www.postgresql.org/docs/current/static/release-9-6-9.html A dump/restore is not required for those running 9.6.X. However, if you use the adminpack extension, you should update it as per the first changelog entry below. Also, if the function marking mistakes mentioned in the second and third changelog entries below affect you, you will want to take steps to correct your database catalogs.
- CVE-2018-1115, boo#1091610: Remove public execute privilege from contrib/adminpack's pg_logfile_rotate() function pg_logfile_rotate() is a deprecated wrapper for the core function pg_rotate_logfile(). When that function was changed to rely on SQL privileges for access control rather than a hard-coded superuser check, pg_logfile_rotate() should have been updated as well, but the need for this was missed. Hence, if adminpack is installed, any user could request a logfile rotation, creating a minor security issue. After installing this update, administrators should update adminpack by performing ALTER EXTENSION adminpack UPDATE in each database in which adminpack is installed.
- Fix incorrect volatility markings on a few built-in functions
- Fix incorrect parallel-safety markings on a few built-in functions.
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Список пакетов
openSUSE Leap 15.1
Ссылки
- E-Mail link for openSUSE-SU-2020:1227-1
- SUSE Security Ratings
- SUSE Bug 1091610
- SUSE Bug 1104199
- SUSE Bug 1104202
- SUSE Bug 1134689
- SUSE Bug 1145092
- SUSE Bug 1148643
- SUSE Bug 1163985
- SUSE Bug 1171924
- SUSE Bug 1175194
- SUSE CVE CVE-2018-10915 page
- SUSE CVE CVE-2018-10925 page
- SUSE CVE CVE-2018-1115 page
- SUSE CVE CVE-2019-10130 page
- SUSE CVE CVE-2019-10208 page
- SUSE CVE CVE-2020-14350 page
- SUSE CVE CVE-2020-1720 page
Описание
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
Затронутые продукты
Ссылки
- CVE-2018-10915
- SUSE Bug 1104199
- SUSE Bug 1140876
- SUSE Bug 1185814
Описание
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Затронутые продукты
Ссылки
- CVE-2018-10925
- SUSE Bug 1104202
Описание
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
Затронутые продукты
Ссылки
- CVE-2018-1115
- SUSE Bug 1091610
Описание
A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
Затронутые продукты
Ссылки
- CVE-2019-10130
- SUSE Bug 1134689
Описание
A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
Затронутые продукты
Ссылки
- CVE-2019-10208
- SUSE Bug 1145092
- SUSE Bug 1171566
Описание
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
Затронутые продукты
Ссылки
- CVE-2020-14350
- SUSE Bug 1175194
- SUSE Bug 1176151
- SUSE Bug 1179115
- SUSE Bug 1179499
- SUSE Bug 1179870
Описание
A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
Затронутые продукты
Ссылки
- CVE-2020-1720
- SUSE Bug 1163985