<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for postgresql12</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:3256-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-09-29T14:31:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-09-29T14:31:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-09-29T14:31:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for postgresql12</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for postgresql12 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2021-3256</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKQBP2PRAEJOFAWUWOWJ6PIS2W2H7IA2/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:3256-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179945</URL>
      <Description>SUSE Bug 1179945</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185952</URL>
      <Description>SUSE Bug 1185952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187751</URL>
      <Description>SUSE Bug 1187751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189748</URL>
      <Description>SUSE Bug 1189748</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3677/</URL>
      <Description>SUSE CVE CVE-2021-3677 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-12.8-8.23.2">postgresql12-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-contrib-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-contrib-12.8-8.23.2">postgresql12-contrib-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-devel-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-devel-12.8-8.23.2">postgresql12-devel-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-docs-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-docs-12.8-8.23.2">postgresql12-docs-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-llvmjit-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-llvmjit-12.8-8.23.2">postgresql12-llvmjit-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-plperl-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-plperl-12.8-8.23.2">postgresql12-plperl-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-plpython-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-plpython-12.8-8.23.2">postgresql12-plpython-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-pltcl-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-pltcl-12.8-8.23.2">postgresql12-pltcl-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-server-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-server-12.8-8.23.2">postgresql12-server-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-server-devel-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-server-devel-12.8-8.23.2">postgresql12-server-devel-12.8-8.23.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql12-test-12.8-8.23.2">
      <FullProductName ProductID="postgresql12-test-12.8-8.23.2">postgresql12-test-12.8-8.23.2</FullProductName>
    </Branch>
    <Relationship ProductReference="postgresql12-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-12.8-8.23.2">postgresql12-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-contrib-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-contrib-12.8-8.23.2">postgresql12-contrib-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-devel-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-devel-12.8-8.23.2">postgresql12-devel-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-docs-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-docs-12.8-8.23.2">postgresql12-docs-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-llvmjit-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-llvmjit-12.8-8.23.2">postgresql12-llvmjit-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-plperl-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-plperl-12.8-8.23.2">postgresql12-plperl-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-plpython-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-plpython-12.8-8.23.2">postgresql12-plpython-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-pltcl-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-pltcl-12.8-8.23.2">postgresql12-pltcl-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-server-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-server-12.8-8.23.2">postgresql12-server-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-server-devel-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-server-devel-12.8-8.23.2">postgresql12-server-devel-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql12-test-12.8-8.23.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:postgresql12-test-12.8-8.23.2">postgresql12-test-12.8-8.23.2 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.</Note>
    </Notes>
    <CVE>CVE-2021-3677</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:postgresql12-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-contrib-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-devel-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-docs-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-llvmjit-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-plperl-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-plpython-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-pltcl-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-server-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-server-devel-12.8-8.23.2</ProductID>
        <ProductID>openSUSE Leap 15.3:postgresql12-test-12.8-8.23.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKQBP2PRAEJOFAWUWOWJ6PIS2W2H7IA2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3677.html</URL>
        <Description>CVE-2021-3677</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189748</URL>
        <Description>SUSE Bug 1189748</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
