Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2013:0633-1: important: Security update for PostgreSQL

Recommended Posts

SUSE Security Update: Security update for PostgreSQL

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2013:0633-1

Rating: important

References: #812525

Cross-References: CVE-2013-1899 CVE-2013-1900 CVE-2013-1901

 

Affected Products:

SUSE Studio Onsite 1.3

SUSE Linux Enterprise Software Development Kit 11 SP2

SUSE Linux Enterprise Server 11 SP2 for VMware

SUSE Linux Enterprise Server 11 SP2

SUSE Linux Enterprise Desktop 11 SP2

______________________________________________________________________________

 

An update that fixes three vulnerabilities is now

available. It includes one version update.

 

Description:

 

 

This update to version 9.1.9 fixes:

 

* CVE-2013-1899: Fix insecure parsing of server

command-line switches.

* CVE-2013-1900: Reset OpenSSL randomness state in each

postmaster child process.

* CVE-2013-1901: Make REPLICATION privilege checks test

current user not authenticated user.

 

Security Issue references:

 

* CVE-2013-1899

 

* CVE-2013-1900

 

* CVE-2013-1901

 

 

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Studio Onsite 1.3:

 

zypper in -t patch slestso13-libecpg6-7585

 

- SUSE Linux Enterprise Software Development Kit 11 SP2:

 

zypper in -t patch sdksp2-libecpg6-7585

 

- SUSE Linux Enterprise Server 11 SP2 for VMware:

 

zypper in -t patch slessp2-libecpg6-7585

 

- SUSE Linux Enterprise Server 11 SP2:

 

zypper in -t patch slessp2-libecpg6-7585

 

- SUSE Linux Enterprise Desktop 11 SP2:

 

zypper in -t patch sledsp2-libecpg6-7585

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Studio Onsite 1.3 (x86_64):

 

libecpg6-9.1.9-0.3.1

postgresql91-devel-9.1.9-0.3.1

 

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.1.9]:

 

postgresql91-devel-9.1.9-0.3.1

 

- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64) [New Version: 9.1.9]:

 

libecpg6-9.1.9-0.3.1

libpq5-9.1.9-0.3.1

postgresql91-9.1.9-0.3.1

postgresql91-contrib-9.1.9-0.3.1

postgresql91-docs-9.1.9-0.3.1

postgresql91-server-9.1.9-0.3.1

 

- SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64) [New Version: 9.1.9]:

 

libpq5-32bit-9.1.9-0.3.1

 

- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 9.1.9]:

 

libecpg6-9.1.9-0.3.1

libpq5-9.1.9-0.3.1

postgresql91-9.1.9-0.3.1

postgresql91-contrib-9.1.9-0.3.1

postgresql91-docs-9.1.9-0.3.1

postgresql91-server-9.1.9-0.3.1

 

- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64) [New Version: 9.1.9]:

 

libpq5-32bit-9.1.9-0.3.1

 

- SUSE Linux Enterprise Server 11 SP2 (ia64) [New Version: 9.1.9]:

 

libpq5-x86-9.1.9-0.3.1

 

- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64) [New Version: 9.1.9]:

 

libecpg6-9.1.9-0.3.1

libpq5-9.1.9-0.3.1

postgresql91-9.1.9-0.3.1

 

- SUSE Linux Enterprise Desktop 11 SP2 (x86_64) [New Version: 9.1.9]:

 

libpq5-32bit-9.1.9-0.3.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2013-1899.html

http://support.novell.com/security/cve/CVE-2013-1900.html

http://support.novell.com/security/cve/CVE-2013-1901.html

https://bugzilla.novell.com/812525

http://download.novell.com/patch/finder/?keywords=0b64ee73ca3435028350ef0220fbc29d

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×