openSUSE Security Update : postgresql96 / postgresql10 and postgresql12 (openSUSE-2020-1227)

Medium Nessus Plugin ID 139655

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for postgresql96, postgresql10 and postgresql12 fixes the following issues :

postgresql10 was updated to 10.13 (bsc#1171924).

https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/10/release-10-13.html

postgresql10 was updated to 10.12 (CVE-2020-1720, bsc#1163985)

- https://www.postgresql.org/about/news/2011/

- https://www.postgresql.org/docs/10/release-10-12.html

postgresql10 was updated to 10.11 :

- https://www.postgresql.org/about/news/1994/

- https://www.postgresql.org/docs/10/release-10-11.html

postgresql12 was updated to 12.3 (bsc#1171924).

Bug Fixes and Improvements :

- Several fixes for GENERATED columns, including an issue where it was possible to crash or corrupt data in a table when the output of the generated column was the exact copy of a physical column on the table, e.g. if the expression called a function which could return its own input.

- Several fixes for ALTER TABLE, including ensuring the SET STORAGE directive is propagated to a table's indexes.

- Fix a potential race condition when using DROP OWNED BY while another session is deleting the same objects.

- Allow for a partition to be detached when it has inherited ROW triggers.

- Several fixes for REINDEX CONCURRENTLY, particularly with issues when a REINDEX CONCURRENTLY operation fails.

- Fix crash when COLLATE is applied to an uncollatable type in a partition bound expression.

- Fix performance regression in floating point overflow/underflow detection.

- Several fixes for full text search, particularly with phrase searching.

- Fix query-lifespan memory leak for a set-returning function used in a query's FROM clause.

- Several reporting fixes for the output of VACUUM VERBOSE.

- Allow input of type circle to accept the format (x,y),r, which is specified in the documentation.

- Allow for the get_bit() and set_bit() functions to not fail on bytea strings longer than 256MB.

- Avoid premature recycling of WAL segments during crash recovery, which could lead to WAL segments being recycled before being archived.

- Avoid attempting to fetch nonexistent WAL files from archive storage during recovery by skipping irrelevant timelines.

- Several fixes for logical replication and replication slots.

- Fix several race conditions in synchronous standby management, including one that occurred when changing the synchronous_standby_names setting.

- Several fixes for GSSAPI support, include a fix for a memory leak that occurred when using GSSAPI encryption.

- Ensure that members of the pg_read_all_stats role can read all statistics views.

- Fix performance regression in information_schema.triggers view.

- Fix memory leak in libpq when using sslmode=verify-full.

- Fix crash in psql when attempting to re-establish a failed connection.

- Allow tab-completion of the filename argument to \gx command in psql.

- Add pg_dump support for ALTER ... DEPENDS ON EXTENSION.

- Several other fixes for pg_dump, which include dumping comments on RLS policies and postponing restore of event triggers until the end.

- Ensure pg_basebackup generates valid tar files.

- pg_checksums skips tablespace subdirectories that belong to a different PostgreSQL major version

- Several Windows compatibility fixes

This update also contains timezone tzdata release 2020a for DST law changes in Morocco and the Canadian Yukon, plus historical corrections for Shanghai. The America/Godthab zone has been renamed to America/Nuuk to reflect current English usage ; however, the old name remains available as a compatibility link. This also updates initdb's list of known Windows time zone names to include recent additions.

For more details, check out :

- https://www.postgresql.org/docs/12/release-12-3.html

Other fixes :

- Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.

postgresql96 was updated to 9.6.19 :

- CVE-2020-14350, boo#1175194: Make contrib modules' installation scripts more secure.

- https://www.postgresql.org/docs/9.6/release-9-6-19.html

- Pack the /usr/lib/postgresql symlink only into the main package.

- Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.

- update to 9.6.18 (boo#1171924).
https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/9.6/release-9-6-18.html

- Unify the spec file to work across all current PostgreSQL versions to simplify future maintenance.

- Move from the 'libs' build flavour to a 'mini' package that will only be used inside the build service and not get shipped, to avoid confusion with the debuginfo packages (boo#1148643).

- update to 9.6.17 (CVE-2020-1720, boo#1163985) https://www.postgresql.org/about/news/2011/ https://www.postgresql.org/docs/9.6/release-9-6-17.html

- use and package the sha256 checksum for for source

- update to 9.6.16:
https://www.postgresql.org/about/news/1994/ https://www.postgresql.org/docs/9.6/release-9-6-16.html

- add requires to the devel package for the libs that are returned by pg_config --libs

- Update to 9.6.15 :

- https://www.postgresql.org/about/news/1960/

- https://www.postgresql.org/docs/9.6/release-9-6-15.html

- CVE-2019-10208, boo#1145092: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution.

- Use FAT LTO objects in order to provide proper static library.

- Update to 9.6.14:
https://www.postgresql.org/docs/9.6/release-9-6-14.html

- Update to 9.6.13 :

- https://www.postgresql.org/docs/9.6/release-9-6-13.html

- https://www.postgresql.org/about/news/1939/

- CVE-2019-10130, boo#1134689: Prevent row-level security policies from being bypassed via selectivity estimators.

- Make the server-devel package exclusive across versions.

- Update to 9.6.12 :

- https://www.postgresql.org/docs/9.6/release-9-6-12.html

- https://www.postgresql.org/about/news/1920/

- By default, panic instead of retrying after fsync() failure, to avoid possible data corruption.

- Numerous other bug fixes.

- Overhaul README.SUSE

- Update to 9.6.11 :

- Numerous bug fixes, see the release notes:
https://www.postgresql.org/docs/9.6/release-9-6-11.html

- Remove unneeded library dependencies from PGXS.

- add provides for the new server-devel package that will be introduced in postgresql 11

- Update to 9.6.10:
https://www.postgresql.org/docs/current/static/release-9
-6-10.html

- CVE-2018-10915, boo#1104199: Fix failure to reset libpq's state fully between connection attempts.

- CVE-2018-10925, boo#1104202: Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT * FROM ...

- Update to 9.6.9:
https://www.postgresql.org/about/news/1851/ https://www.postgresql.org/docs/current/static/release-9
-6-9.html A dump/restore is not required for those running 9.6.X. However, if you use the adminpack extension, you should update it as per the first changelog entry below. Also, if the function marking mistakes mentioned in the second and third changelog entries below affect you, you will want to take steps to correct your database catalogs.

- CVE-2018-1115, boo#1091610: Remove public execute privilege from contrib/adminpack's pg_logfile_rotate() function pg_logfile_rotate() is a deprecated wrapper for the core function pg_rotate_logfile(). When that function was changed to rely on SQL privileges for access control rather than a hard-coded superuser check, pg_logfile_rotate() should have been updated as well, but the need for this was missed. Hence, if adminpack is installed, any user could request a logfile rotation, creating a minor security issue. After installing this update, administrators should update adminpack by performing ALTER EXTENSION adminpack UPDATE in each database in which adminpack is installed.

- Fix incorrect volatility markings on a few built-in functions

- Fix incorrect parallel-safety markings on a few built-in functions.

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Solution

Update the affected postgresql96 / postgresql10 and postgresql12 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1091610

https://bugzilla.opensuse.org/show_bug.cgi?id=1104199

https://bugzilla.opensuse.org/show_bug.cgi?id=1104202

https://bugzilla.opensuse.org/show_bug.cgi?id=1134689

https://bugzilla.opensuse.org/show_bug.cgi?id=1145092

https://bugzilla.opensuse.org/show_bug.cgi?id=1148643

https://bugzilla.opensuse.org/show_bug.cgi?id=1163985

https://bugzilla.opensuse.org/show_bug.cgi?id=1171924

https://bugzilla.opensuse.org/show_bug.cgi?id=1175194

https://www.postgresql.org/about/news/1851/

https://www.postgresql.org/about/news/1920/

https://www.postgresql.org/about/news/1939/

https://www.postgresql.org/about/news/1960/

https://www.postgresql.org/about/news/1994/

https://www.postgresql.org/about/news/2011/

https://www.postgresql.org/about/news/2038/

https://www.postgresql.org/docs/10/release-10-11.html

https://www.postgresql.org/docs/10/release-10-12.html

https://www.postgresql.org/docs/10/release-10-13.html

https://www.postgresql.org/docs/12/release-12-3.html

https://www.postgresql.org/docs/9.6/release-9-6-11.html

https://www.postgresql.org/docs/9.6/release-9-6-12.html

https://www.postgresql.org/docs/9.6/release-9-6-13.html

https://www.postgresql.org/docs/9.6/release-9-6-14.html

https://www.postgresql.org/docs/9.6/release-9-6-15.html

https://www.postgresql.org/docs/9.6/release-9-6-16.html

https://www.postgresql.org/docs/9.6/release-9-6-17.html

https://www.postgresql.org/docs/9.6/release-9-6-18.html

https://www.postgresql.org/docs/9.6/release-9-6-19.html

https://www.postgresql.org/docs/current/release-9-6-10.html

https://www.postgresql.org/docs/current/release-9-6-9.html

Plugin Details

Severity: Medium

ID: 139655

File Name: openSUSE-2020-1227.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2020/08/18

Updated: 2020/08/24

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 6.7

CVSS Score Source: CVE-2019-10208

CVSS v2.0

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libecpg6, p-cpe:/a:novell:opensuse:libecpg6-debuginfo, p-cpe:/a:novell:opensuse:libpq5, p-cpe:/a:novell:opensuse:libpq5-debuginfo, p-cpe:/a:novell:opensuse:postgresql, p-cpe:/a:novell:opensuse:postgresql-contrib, p-cpe:/a:novell:opensuse:postgresql-devel, p-cpe:/a:novell:opensuse:postgresql-llvmjit, p-cpe:/a:novell:opensuse:postgresql-plperl, p-cpe:/a:novell:opensuse:postgresql-plpython, p-cpe:/a:novell:opensuse:postgresql-pltcl, p-cpe:/a:novell:opensuse:postgresql-server, p-cpe:/a:novell:opensuse:postgresql-server-devel, p-cpe:/a:novell:opensuse:postgresql-test, p-cpe:/a:novell:opensuse:postgresql10, p-cpe:/a:novell:opensuse:postgresql10-contrib, p-cpe:/a:novell:opensuse:postgresql10-contrib-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-debugsource, p-cpe:/a:novell:opensuse:postgresql10-devel, p-cpe:/a:novell:opensuse:postgresql10-devel-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-plperl, p-cpe:/a:novell:opensuse:postgresql10-plperl-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-plpython, p-cpe:/a:novell:opensuse:postgresql10-plpython-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-pltcl, p-cpe:/a:novell:opensuse:postgresql10-pltcl-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-server, p-cpe:/a:novell:opensuse:postgresql10-server-debuginfo, p-cpe:/a:novell:opensuse:postgresql10-test, p-cpe:/a:novell:opensuse:postgresql12, p-cpe:/a:novell:opensuse:postgresql12-contrib, p-cpe:/a:novell:opensuse:postgresql12-contrib-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-debugsource, p-cpe:/a:novell:opensuse:postgresql12-devel, p-cpe:/a:novell:opensuse:postgresql12-devel-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-llvmjit, p-cpe:/a:novell:opensuse:postgresql12-llvmjit-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-plperl, p-cpe:/a:novell:opensuse:postgresql12-plperl-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-plpython, p-cpe:/a:novell:opensuse:postgresql12-plpython-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-pltcl, p-cpe:/a:novell:opensuse:postgresql12-pltcl-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-server, p-cpe:/a:novell:opensuse:postgresql12-server-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-server-devel, p-cpe:/a:novell:opensuse:postgresql12-server-devel-debuginfo, p-cpe:/a:novell:opensuse:postgresql12-test, p-cpe:/a:novell:opensuse:postgresql96, p-cpe:/a:novell:opensuse:postgresql96-contrib, p-cpe:/a:novell:opensuse:postgresql96-contrib-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-debugsource, p-cpe:/a:novell:opensuse:postgresql96-devel, p-cpe:/a:novell:opensuse:postgresql96-devel-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-plperl, p-cpe:/a:novell:opensuse:postgresql96-plperl-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-plpython, p-cpe:/a:novell:opensuse:postgresql96-plpython-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-pltcl, p-cpe:/a:novell:opensuse:postgresql96-pltcl-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-server, p-cpe:/a:novell:opensuse:postgresql96-server-debuginfo, p-cpe:/a:novell:opensuse:postgresql96-test, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/08/17

Vulnerability Publication Date: 2018/05/10

Reference Information

CVE: CVE-2018-10915, CVE-2018-10925, CVE-2018-1115, CVE-2019-10130, CVE-2019-10208, CVE-2020-14350, CVE-2020-1720

IAVB: 2020-B-0047