Oval Definition:oval:org.opensuse.security:def:80268
Revision Date:2016-03-07Version:1
Title:Security update for postgresql94 (Important)
Description:



This update for postgresql94 fixes the following issues:

- Security and bugfix release 9.4.6: * *** IMPORTANT *** Users of version 9.4 will need to reindex any jsonb_path_ops indexes they have created, in order to fix a persistent issue with missing index entries. * Fix infinite loops and buffer-overrun problems in regular expressions (CVE-2016-0773, bsc#966436). * Fix regular-expression compiler to handle loops of constraint arcs (CVE-2007-4772). * Prevent certain PL/Java parameters from being set by non-superusers (CVE-2016-0766, bsc#966435). * Fix many issues in pg_dump with specific object types * Prevent over-eager pushdown of HAVING clauses for GROUPING SETS * Fix deparsing error with ON CONFLICT ... WHERE clauses * Fix tableoid errors for postgres_fdw * Prevent floating-point exceptions in pgbench * Make \det search Foreign Table names consistently * Fix quoting of domain constraint names in pg_dump * Prevent putting expanded objects into Const nodes * Allow compile of PL/Java on Windows * Fix 'unresolved symbol' errors in PL/Python execution * Allow Python2 and Python3 to be used in the same database * Add support for Python 3.5 in PL/Python * Fix issue with subdirectory creation during initdb * Make pg_ctl report status correctly on Windows * Suppress confusing error when using pg_receivexlog with older servers * Multiple documentation corrections and additions * Fix erroneous hash calculations in gin_extract_jsonb_path() - For the full release notse, see: http://www.postgresql.org/docs/9.4/static/release-9-4-6.html

- Security and bugfix release 9.4.5: * CVE-2015-5289, bsc#949670: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. * CVE-2015-5288, bsc#949669: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. - For the full release notse, see: http://www.postgresql.org/docs/current/static/release-9-4-5.html - Relax dependency on libpq to major version.
Family:unixClass:patch
Status:Reference(s):949669
949670
966435
966436
CVE-2007-4772
CVE-2015-5288
CVE-2015-5289
CVE-2016-0766
CVE-2016-0773
SUSE-SU-2016:0677-1
Platform(s):SUSE Linux Enterprise Desktop 11 SP4
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Desktop 11 SP4 is installed
  • AND Package Information
  • libecpg6-9.4.6-0.14.3 is installed
  • OR libpq5-9.4.6-0.14.3 is installed
  • OR libpq5-32bit-9.4.6-0.14.3 is installed
  • OR postgresql94-9.4.6-0.14.3 is installed
  • OR postgresql94-docs-9.4.6-0.14.3 is installed
  • BACK