<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for postgresql93</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2414-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-29T11:12:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-29T11:12:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-29T11:12:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for postgresql93</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for postgresql93 to version 9.3.14 fixes the several issues.

These security issues were fixed:
- CVE-2016-5423: CASE/WHEN with inlining can cause untrusted pointer dereference (bsc#993454).
- CVE-2016-5424: Fix client programs' handling of special characters in database and role names (bsc#993453).

This non-security issue was fixed:
- bsc#973660: Added 'Requires: timezone' to Service Pack

For additional non-security issues please refer to
- http://www.postgresql.org/docs/9.3/static/release-9-3-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-13.html
- http://www.postgresql.org/docs/9.4/static/release-9-3-12.html 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-2016-1407,SUSE-SLE-SERVER-12-2016-1407</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162414-1/</URL>
      <Description>Link for SUSE-SU-2016:2414-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00033.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2414-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/973660</URL>
      <Description>SUSE Bug 973660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993453</URL>
      <Description>SUSE Bug 993453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/993454</URL>
      <Description>SUSE Bug 993454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5423/</URL>
      <Description>SUSE CVE CVE-2016-5423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5424/</URL>
      <Description>SUSE CVE CVE-2016-5424 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="postgresql93-9.3.14-19.2">
      <FullProductName ProductID="postgresql93-9.3.14-19.2">postgresql93-9.3.14-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql93-contrib-9.3.14-19.2">
      <FullProductName ProductID="postgresql93-contrib-9.3.14-19.2">postgresql93-contrib-9.3.14-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql93-docs-9.3.14-19.2">
      <FullProductName ProductID="postgresql93-docs-9.3.14-19.2">postgresql93-docs-9.3.14-19.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql93-server-9.3.14-19.2">
      <FullProductName ProductID="postgresql93-server-9.3.14-19.2">postgresql93-server-9.3.14-19.2</FullProductName>
    </Branch>
    <Relationship ProductReference="postgresql93-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:postgresql93-9.3.14-19.2">postgresql93-9.3.14-19.2 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-contrib-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:postgresql93-contrib-9.3.14-19.2">postgresql93-contrib-9.3.14-19.2 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-docs-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:postgresql93-docs-9.3.14-19.2">postgresql93-docs-9.3.14-19.2 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-server-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:postgresql93-server-9.3.14-19.2">postgresql93-server-9.3.14-19.2 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-9.3.14-19.2">postgresql93-9.3.14-19.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-contrib-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-contrib-9.3.14-19.2">postgresql93-contrib-9.3.14-19.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-docs-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-docs-9.3.14-19.2">postgresql93-docs-9.3.14-19.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql93-server-9.3.14-19.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-server-9.3.14-19.2">postgresql93-server-9.3.14-19.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.</Note>
    </Notes>
    <CVE>CVE-2016-5423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-contrib-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-docs-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-server-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-contrib-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-docs-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-server-9.3.14-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162414-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5423.html</URL>
        <Description>CVE-2016-5423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1041981</URL>
        <Description>SUSE Bug 1041981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042497</URL>
        <Description>SUSE Bug 1042497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052683</URL>
        <Description>SUSE Bug 1052683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993454</URL>
        <Description>SUSE Bug 993454</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.</Note>
    </Notes>
    <CVE>CVE-2016-5424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-contrib-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-docs-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:postgresql93-server-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-contrib-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-docs-9.3.14-19.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:postgresql93-server-9.3.14-19.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162414-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5424.html</URL>
        <Description>CVE-2016-5424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1041981</URL>
        <Description>SUSE Bug 1041981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042497</URL>
        <Description>SUSE Bug 1042497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052683</URL>
        <Description>SUSE Bug 1052683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993453</URL>
        <Description>SUSE Bug 993453</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
