File _patchinfo of Package patchinfo.17249

<patchinfo incident="17249">
  <category>security</category>
  <rating>important</rating>
  <packager>msmeissn</packager>
  <summary>Security update for postgresql12</summary>
  <description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.5:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/12/release-12-5.html

The previous postgresql12 update already addressed:

Update to 12.4:

* CVE-2020-14349, bsc#1175193: Set a secure search_path in logical replication walsenders and apply workers
* CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure.

* https://www.postgresql.org/docs/12/release-12-4.html

  </description>
  <issue id="2020-25694" tracker="cve"/>
  <issue id="2020-25695" tracker="cve"/>
  <issue id="2020-25696" tracker="cve"/>
  <issue id="2020-14350" tracker="cve"/>
  <issue id="2020-14349" tracker="cve"/>
  <issue id="1175193" tracker="bnc">VUL-0: CVE-2020-14349: postgresql10,postgresql12: Set a secure search_path in logical replication walsenders and apply workers</issue>
  <issue id="1175194" tracker="bnc">VUL-0: CVE-2020-14350: postgresql96,postgresql10,postgresql12: Make contrib modules' installation scripts more secure</issue>
  <issue id="1178666" tracker="bnc">VUL-0: CVE-2020-25695: postgresql96,postgresql10,postgresql12: potential query escalation</issue>
  <issue id="1178667" tracker="bnc">VUL-0: CVE-2020-25694: postgresql96,postgresql10,postgresql12: Fix usage of complex connection-string parameters in pg_ tools</issue>
  <issue id="1178668" tracker="bnc">VUL-0: CVE-2020-25696: postgresql96,postgresql10,postgresql12: \gset command from modifying specially-treated variables</issue>
</patchinfo>
openSUSE Build Service is sponsored by