<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for postgresql95</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0529-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-02-22T19:46:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-02-22T19:46:15Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-02-22T19:46:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for postgresql95</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for postgresql95 fixes the following issues:

Upate to PostgreSQL 9.5.11:

Security issues fixed:

  * https://www.postgresql.org/docs/9.5/static/release-9-5-11.html 
  * CVE-2018-1053, boo#1077983: Ensure that all temporary files 
    made by pg_upgrade are non-world-readable. 
  * boo#1079757: Rename pg_rewind's copy_file_range function to 
    avoid conflict with new Linux system call of that name.

In version 9.5.10:

  * https://www.postgresql.org/docs/9.5/static/release-9-5-10.html
  * CVE-2017-15098, boo#1067844: Memory disclosure in JSON
    functions.
  * CVE-2017-15099, boo#1067841: INSERT ... ON CONFLICT DO UPDATE 
    fails to enforce SELECT privileges.

In version 9.5.9:

  * https://www.postgresql.org/docs/9.5/static/release-9-5-9.html
  * Show foreign tables in information_schema.table_privileges
    view.
  * Clean up handling of a fatal exit (e.g., due to receipt of
    SIGTERM) that occurs while trying to execute a ROLLBACK of a
    failed transaction.
  * Remove assertion that could trigger during a fatal exit.
  * Correctly identify columns that are of a range type or domain
    type over a composite type or domain type being searched for.
  * Fix crash in pg_restore when using parallel mode and using a
    list file to select a subset of items to restore.
  * Change ecpg's parser to allow RETURNING clauses without
    attached C variables.

In version 9.5.8

  * https://www.postgresql.org/docs/9.5/static/release-9-5-8.html
  * CVE-2017-7547, boo#1051685: Further restrict visibility of
    pg_user_mappings.umoptions, to protect passwords stored as
    user mapping options.
  * CVE-2017-7546, boo#1051684: Disallow empty passwords in all
    password-based authentication methods.
  * CVE-2017-7548, boo#1053259: lo_put() function ignores ACLs.

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0529-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-9.5.11-2.3.1">postgresql95-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-contrib-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-contrib-9.5.11-2.3.1">postgresql95-contrib-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-devel-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-devel-9.5.11-2.3.1">postgresql95-devel-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-docs-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-docs-9.5.11-2.3.1">postgresql95-docs-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-libs-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-libs-9.5.11-2.3.1">postgresql95-libs-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-plperl-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-plperl-9.5.11-2.3.1">postgresql95-plperl-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-plpython-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-plpython-9.5.11-2.3.1">postgresql95-plpython-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-pltcl-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-pltcl-9.5.11-2.3.1">postgresql95-pltcl-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-server-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-server-9.5.11-2.3.1">postgresql95-server-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-test-9.5.11-2.3.1">
      <FullProductName ProductID="postgresql95-test-9.5.11-2.3.1">postgresql95-test-9.5.11-2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="postgresql95-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1">postgresql95-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-contrib-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1">postgresql95-contrib-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-devel-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1">postgresql95-devel-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-docs-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1">postgresql95-docs-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-libs-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1">postgresql95-libs-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-plperl-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1">postgresql95-plperl-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-plpython-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1">postgresql95-plpython-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-pltcl-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1">postgresql95-pltcl-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-server-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1">postgresql95-server-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-test-9.5.11-2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1">postgresql95-test-9.5.11-2.3.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.</Note>
    </Notes>
    <CVE>CVE-2017-15098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15098.html</URL>
        <Description>CVE-2017-15098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067844</URL>
        <Description>SUSE Bug 1067844</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.</Note>
    </Notes>
    <CVE>CVE-2017-15099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:L/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-15099.html</URL>
        <Description>CVE-2017-15099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1067841</URL>
        <Description>SUSE Bug 1067841</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.</Note>
    </Notes>
    <CVE>CVE-2017-7546</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7546.html</URL>
        <Description>CVE-2017-7546</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051684</URL>
        <Description>SUSE Bug 1051684</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054365</URL>
        <Description>SUSE Bug 1054365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140876</URL>
        <Description>SUSE Bug 1140876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.</Note>
    </Notes>
    <CVE>CVE-2017-7547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7547.html</URL>
        <Description>CVE-2017-7547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051685</URL>
        <Description>SUSE Bug 1051685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054365</URL>
        <Description>SUSE Bug 1054365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140876</URL>
        <Description>SUSE Bug 1140876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL versions before 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers with no privileges on a large object to overwrite the entire contents of the object, resulting in a denial of service.</Note>
    </Notes>
    <CVE>CVE-2017-7548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7548.html</URL>
        <Description>CVE-2017-7548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1053259</URL>
        <Description>SUSE Bug 1053259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1054365</URL>
        <Description>SUSE Bug 1054365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1140876</URL>
        <Description>SUSE Bug 1140876</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.</Note>
    </Notes>
    <CVE>CVE-2018-1053</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:postgresql95-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-contrib-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-devel-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-docs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-libs-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plperl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-plpython-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-pltcl-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-server-9.5.11-2.3.1</ProductID>
        <ProductID>openSUSE Leap 42.3:postgresql95-test-9.5.11-2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1053.html</URL>
        <Description>CVE-2018-1053</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077983</URL>
        <Description>SUSE Bug 1077983</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
