<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for postgresql94</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1772-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-07-04T15:25:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-07-04T15:25:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-07-04T15:25:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for postgresql94</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for postgresql94 to 9.4.12 fixes the following issues:

Upstream changelogs:

- https://www.postgresql.org/docs/9.4/static/release-9-4-12.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-11.html
- https://www.postgresql.org/docs/9.4/static/release-9-4-10.html

Security issues fixed:

* CVE-2017-7486: Restrict visibility of
  pg_user_mappings.umoptions, to protect passwords stored as
  user mapping options. (bsc#1037624)

  Please note that manual action is needed to fix this in existing databases
  See the upstream release notes for details.
* CVE-2017-7485: recognize PGREQUIRESSL variable
  again. (bsc#1038293)
* CVE-2017-7484: Prevent exposure of statistical
  information via leaky operators. (bsc#1037603)

Changes in version 9.4.12:

* Build corruption with CREATE INDEX CONCURRENTLY
* Fixes for visibility and write-ahead-log stability

Changes in version 9.4.10:

* Fix WAL-logging of truncation of relation free space maps and
  visibility maps
* Fix incorrect creation of GIN index WAL records on big-endian
  machines
* Fix SELECT FOR UPDATE/SHARE to correctly lock tuples that have
  been updated by a subsequently-aborted transaction
* Fix EvalPlanQual rechecks involving CTE scans
* Fix improper repetition of previous results from hashed
  aggregation in a subquery

The libraries libpq and libecpg are now supplied by postgresql 9.6.

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1772-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-9.4.12-9.6.1">postgresql94-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-contrib-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-contrib-9.4.12-9.6.1">postgresql94-contrib-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-devel-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-devel-9.4.12-9.6.1">postgresql94-devel-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-docs-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-docs-9.4.12-9.6.1">postgresql94-docs-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-libs-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-libs-9.4.12-9.6.1">postgresql94-libs-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-plperl-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-plperl-9.4.12-9.6.1">postgresql94-plperl-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-plpython-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-plpython-9.4.12-9.6.1">postgresql94-plpython-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-pltcl-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-pltcl-9.4.12-9.6.1">postgresql94-pltcl-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-server-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-server-9.4.12-9.6.1">postgresql94-server-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql94-test-9.4.12-9.6.1">
      <FullProductName ProductID="postgresql94-test-9.4.12-9.6.1">postgresql94-test-9.4.12-9.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="postgresql94-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-9.4.12-9.6.1">postgresql94-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-contrib-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-contrib-9.4.12-9.6.1">postgresql94-contrib-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-devel-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-devel-9.4.12-9.6.1">postgresql94-devel-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-docs-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-docs-9.4.12-9.6.1">postgresql94-docs-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-libs-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-libs-9.4.12-9.6.1">postgresql94-libs-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-plperl-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-plperl-9.4.12-9.6.1">postgresql94-plperl-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-plpython-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-plpython-9.4.12-9.6.1">postgresql94-plpython-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-pltcl-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-pltcl-9.4.12-9.6.1">postgresql94-pltcl-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-server-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-server-9.4.12-9.6.1">postgresql94-server-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql94-test-9.4.12-9.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:postgresql94-test-9.4.12-9.6.1">postgresql94-test-9.4.12-9.6.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.</Note>
    </Notes>
    <CVE>CVE-2017-7484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:postgresql94-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-contrib-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-devel-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-docs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-libs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plperl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plpython-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-pltcl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-server-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-test-9.4.12-9.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7484.html</URL>
        <Description>CVE-2017-7484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037603</URL>
        <Description>SUSE Bug 1037603</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051015</URL>
        <Description>SUSE Bug 1051015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.</Note>
    </Notes>
    <CVE>CVE-2017-7485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:postgresql94-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-contrib-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-devel-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-docs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-libs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plperl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plpython-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-pltcl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-server-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-test-9.4.12-9.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7485.html</URL>
        <Description>CVE-2017-7485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038293</URL>
        <Description>SUSE Bug 1038293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051015</URL>
        <Description>SUSE Bug 1051015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.</Note>
    </Notes>
    <CVE>CVE-2017-7486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:postgresql94-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-contrib-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-devel-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-docs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-libs-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plperl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-plpython-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-pltcl-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-server-9.4.12-9.6.1</ProductID>
        <ProductID>openSUSE Leap 42.2:postgresql94-test-9.4.12-9.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7486.html</URL>
        <Description>CVE-2017-7486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1037624</URL>
        <Description>SUSE Bug 1037624</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051015</URL>
        <Description>SUSE Bug 1051015</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1051685</URL>
        <Description>SUSE Bug 1051685</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
