<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for postgresql10</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0894-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-06-17T22:06:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-06-17T22:06:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-06-17T22:06:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for postgresql10</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).

This update was imported from the SUSE:SLE-15-SP1:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-894</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0894-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183168</URL>
      <Description>SUSE Bug 1183168</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185924</URL>
      <Description>SUSE Bug 1185924</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185925</URL>
      <Description>SUSE Bug 1185925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32027/</URL>
      <Description>SUSE CVE CVE-2021-32027 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32028/</URL>
      <Description>SUSE CVE CVE-2021-32028 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-10.17-lp152.2.21.1">postgresql10-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-contrib-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-contrib-10.17-lp152.2.21.1">postgresql10-contrib-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-devel-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-devel-10.17-lp152.2.21.1">postgresql10-devel-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-docs-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-docs-10.17-lp152.2.21.1">postgresql10-docs-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-plperl-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-plperl-10.17-lp152.2.21.1">postgresql10-plperl-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-plpython-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-plpython-10.17-lp152.2.21.1">postgresql10-plpython-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-pltcl-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-pltcl-10.17-lp152.2.21.1">postgresql10-pltcl-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-server-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-server-10.17-lp152.2.21.1">postgresql10-server-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql10-test-10.17-lp152.2.21.1">
      <FullProductName ProductID="postgresql10-test-10.17-lp152.2.21.1">postgresql10-test-10.17-lp152.2.21.1</FullProductName>
    </Branch>
    <Relationship ProductReference="postgresql10-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-10.17-lp152.2.21.1">postgresql10-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-contrib-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-contrib-10.17-lp152.2.21.1">postgresql10-contrib-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-devel-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-devel-10.17-lp152.2.21.1">postgresql10-devel-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-docs-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-docs-10.17-lp152.2.21.1">postgresql10-docs-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-plperl-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-plperl-10.17-lp152.2.21.1">postgresql10-plperl-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-plpython-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-plpython-10.17-lp152.2.21.1">postgresql10-plpython-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-pltcl-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-pltcl-10.17-lp152.2.21.1">postgresql10-pltcl-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-server-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-server-10.17-lp152.2.21.1">postgresql10-server-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql10-test-10.17-lp152.2.21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:postgresql10-test-10.17-lp152.2.21.1">postgresql10-test-10.17-lp152.2.21.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-32027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:postgresql10-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-contrib-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-devel-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-docs-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-plperl-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-plpython-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-pltcl-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-server-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-test-10.17-lp152.2.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32027.html</URL>
        <Description>CVE-2021-32027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185924</URL>
        <Description>SUSE Bug 1185924</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.</Note>
    </Notes>
    <CVE>CVE-2021-32028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:postgresql10-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-contrib-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-devel-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-docs-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-plperl-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-plpython-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-pltcl-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-server-10.17-lp152.2.21.1</ProductID>
        <ProductID>openSUSE Leap 15.2:postgresql10-test-10.17-lp152.2.21.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32028.html</URL>
        <Description>CVE-2021-32028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185925</URL>
        <Description>SUSE Bug 1185925</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
