Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:1227-1

Опубликовано: 17 авг. 2020
Источник: suse-cvrf

Описание

Security update for postgresql96, postgresql10 and postgresql12

This update for postgresql96, postgresql10 and postgresql12 fixes the following issues:

postgresql10 was updated to 10.13 (bsc#1171924).

https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/10/release-10-13.html

postgresql10 was updated to 10.12 (CVE-2020-1720, bsc#1163985)

postgresql10 was updated to 10.11:

postgresql12 was updated to 12.3 (bsc#1171924).

Bug Fixes and Improvements:

  • Several fixes for GENERATED columns, including an issue where it was possible to crash or corrupt data in a table when the output of the generated column was the exact copy of a physical column on the table, e.g. if the expression called a function which could return its own input.
  • Several fixes for ALTER TABLE, including ensuring the SET STORAGE directive is propagated to a table's indexes.
  • Fix a potential race condition when using DROP OWNED BY while another session is deleting the same objects.
  • Allow for a partition to be detached when it has inherited ROW triggers.
  • Several fixes for REINDEX CONCURRENTLY, particularly with issues when a REINDEX CONCURRENTLY operation fails.
  • Fix crash when COLLATE is applied to an uncollatable type in a partition bound expression.
  • Fix performance regression in floating point overflow/underflow detection.
  • Several fixes for full text search, particularly with phrase searching.
  • Fix query-lifespan memory leak for a set-returning function used in a query's FROM clause.
  • Several reporting fixes for the output of VACUUM VERBOSE.
  • Allow input of type circle to accept the format (x,y),r, which is specified in the documentation.
  • Allow for the get_bit() and set_bit() functions to not fail on bytea strings longer than 256MB.
  • Avoid premature recycling of WAL segments during crash recovery, which could lead to WAL segments being recycled before being archived.
  • Avoid attempting to fetch nonexistent WAL files from archive storage during recovery by skipping irrelevant timelines.
  • Several fixes for logical replication and replication slots.
  • Fix several race conditions in synchronous standby management, including one that occurred when changing the synchronous_standby_names setting.
  • Several fixes for GSSAPI support, include a fix for a memory leak that occurred when using GSSAPI encryption.
  • Ensure that members of the pg_read_all_stats role can read all statistics views.
  • Fix performance regression in information_schema.triggers view.
  • Fix memory leak in libpq when using sslmode=verify-full.
  • Fix crash in psql when attempting to re-establish a failed connection.
  • Allow tab-completion of the filename argument to \gx command in psql.
  • Add pg_dump support for ALTER ... DEPENDS ON EXTENSION.
  • Several other fixes for pg_dump, which include dumping comments on RLS policies and postponing restore of event triggers until the end.
  • Ensure pg_basebackup generates valid tar files.
  • pg_checksums skips tablespace subdirectories that belong to a different PostgreSQL major version
  • Several Windows compatibility fixes

This update also contains timezone tzdata release 2020a for DST law changes in Morocco and the Canadian Yukon, plus historical corrections for Shanghai. The America/Godthab zone has been renamed to America/Nuuk to reflect current English usage ; however, the old name remains available as a compatibility link. This also updates initdb's list of known Windows time zone names to include recent additions.

For more details, check out:

Other fixes:

  • Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.

postgresql96 was updated to 9.6.19:

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Список пакетов

openSUSE Leap 15.1
libecpg6-12.3-lp151.2.1
libpq5-12.3-lp151.2.1
postgresql-12.0.1-lp151.6.9.1
postgresql-contrib-12.0.1-lp151.6.9.1
postgresql-devel-12.0.1-lp151.6.9.1
postgresql-docs-12.0.1-lp151.6.9.1
postgresql-llvmjit-12.0.1-lp151.6.9.1
postgresql-plperl-12.0.1-lp151.6.9.1
postgresql-plpython-12.0.1-lp151.6.9.1
postgresql-pltcl-12.0.1-lp151.6.9.1
postgresql-server-12.0.1-lp151.6.9.1
postgresql-server-devel-12.0.1-lp151.6.9.1
postgresql-test-12.0.1-lp151.6.9.1
postgresql10-10.13-lp151.2.14.1
postgresql10-contrib-10.13-lp151.2.14.1
postgresql10-devel-10.13-lp151.2.14.1
postgresql10-docs-10.13-lp151.2.14.1
postgresql10-plperl-10.13-lp151.2.14.1
postgresql10-plpython-10.13-lp151.2.14.1
postgresql10-pltcl-10.13-lp151.2.14.1
postgresql10-server-10.13-lp151.2.14.1
postgresql10-test-10.13-lp151.2.14.1
postgresql12-12.3-lp151.2.1
postgresql12-contrib-12.3-lp151.2.1
postgresql12-devel-12.3-lp151.2.1
postgresql12-docs-12.3-lp151.2.1
postgresql12-llvmjit-12.3-lp151.2.1
postgresql12-plperl-12.3-lp151.2.1
postgresql12-plpython-12.3-lp151.2.1
postgresql12-pltcl-12.3-lp151.2.1
postgresql12-server-12.3-lp151.2.1
postgresql12-server-devel-12.3-lp151.2.1
postgresql12-test-12.3-lp151.2.1
postgresql96-9.6.19-lp151.3.3.1
postgresql96-contrib-9.6.19-lp151.3.3.1
postgresql96-devel-9.6.19-lp151.3.3.1
postgresql96-docs-9.6.19-lp151.3.3.1
postgresql96-plperl-9.6.19-lp151.3.3.1
postgresql96-plpython-9.6.19-lp151.3.3.1
postgresql96-pltcl-9.6.19-lp151.3.3.1
postgresql96-server-9.6.19-lp151.3.3.1
postgresql96-test-9.6.19-lp151.3.3.1

Описание

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки

Описание

A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.


Затронутые продукты
openSUSE Leap 15.1:libecpg6-12.3-lp151.2.1
openSUSE Leap 15.1:libpq5-12.3-lp151.2.1
openSUSE Leap 15.1:postgresql-12.0.1-lp151.6.9.1
openSUSE Leap 15.1:postgresql-contrib-12.0.1-lp151.6.9.1

Ссылки
Уязвимость openSUSE-SU-2020:1227-1