<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libecpg6-32bit-9.5.4-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10273</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libecpg6-32bit-9.5.4-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libecpg6-32bit-9.5.4-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10273</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10273</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-4772/</URL>
      <Description>SUSE CVE CVE-2007-4772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2007-6600/</URL>
      <Description>SUSE CVE CVE-2007-6600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4034/</URL>
      <Description>SUSE CVE CVE-2009-4034 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-4136/</URL>
      <Description>SUSE CVE CVE-2009-4136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1169/</URL>
      <Description>SUSE CVE CVE-2010-1169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1170/</URL>
      <Description>SUSE CVE CVE-2010-1170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3433/</URL>
      <Description>SUSE CVE CVE-2010-3433 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0866/</URL>
      <Description>SUSE CVE CVE-2012-0866 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0867/</URL>
      <Description>SUSE CVE CVE-2012-0867 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-0868/</URL>
      <Description>SUSE CVE CVE-2012-0868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2143/</URL>
      <Description>SUSE CVE CVE-2012-2143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2655/</URL>
      <Description>SUSE CVE CVE-2012-2655 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3488/</URL>
      <Description>SUSE CVE CVE-2012-3488 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3489/</URL>
      <Description>SUSE CVE CVE-2012-3489 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0255/</URL>
      <Description>SUSE CVE CVE-2013-0255 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1899/</URL>
      <Description>SUSE CVE CVE-2013-1899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1900/</URL>
      <Description>SUSE CVE CVE-2013-1900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1901/</URL>
      <Description>SUSE CVE CVE-2013-1901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0060/</URL>
      <Description>SUSE CVE CVE-2014-0060 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0061/</URL>
      <Description>SUSE CVE CVE-2014-0061 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0062/</URL>
      <Description>SUSE CVE CVE-2014-0062 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0063/</URL>
      <Description>SUSE CVE CVE-2014-0063 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0064/</URL>
      <Description>SUSE CVE CVE-2014-0064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0065/</URL>
      <Description>SUSE CVE CVE-2014-0065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0066/</URL>
      <Description>SUSE CVE CVE-2014-0066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0067/</URL>
      <Description>SUSE CVE CVE-2014-0067 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3165/</URL>
      <Description>SUSE CVE CVE-2015-3165 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3166/</URL>
      <Description>SUSE CVE CVE-2015-3166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3167/</URL>
      <Description>SUSE CVE CVE-2015-3167 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5288/</URL>
      <Description>SUSE CVE CVE-2015-5288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5289/</URL>
      <Description>SUSE CVE CVE-2015-5289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0766/</URL>
      <Description>SUSE CVE CVE-2016-0766 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0773/</URL>
      <Description>SUSE CVE CVE-2016-0773 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2193/</URL>
      <Description>SUSE CVE CVE-2016-2193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3065/</URL>
      <Description>SUSE CVE CVE-2016-3065 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5423/</URL>
      <Description>SUSE CVE CVE-2016-5423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5424/</URL>
      <Description>SUSE CVE CVE-2016-5424 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libecpg6-9.5.4-1.2">
      <FullProductName ProductID="libecpg6-9.5.4-1.2">libecpg6-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libecpg6-32bit-9.5.4-1.2">
      <FullProductName ProductID="libecpg6-32bit-9.5.4-1.2">libecpg6-32bit-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpq5-9.5.4-1.2">
      <FullProductName ProductID="libpq5-9.5.4-1.2">libpq5-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libpq5-32bit-9.5.4-1.2">
      <FullProductName ProductID="libpq5-32bit-9.5.4-1.2">libpq5-32bit-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-9.5.4-1.2">postgresql95-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-contrib-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-contrib-9.5.4-1.2">postgresql95-contrib-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-devel-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-devel-9.5.4-1.2">postgresql95-devel-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-docs-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-docs-9.5.4-1.2">postgresql95-docs-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-plperl-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-plperl-9.5.4-1.2">postgresql95-plperl-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-plpython-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-plpython-9.5.4-1.2">postgresql95-plpython-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-pltcl-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-pltcl-9.5.4-1.2">postgresql95-pltcl-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-server-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-server-9.5.4-1.2">postgresql95-server-9.5.4-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="postgresql95-test-9.5.4-1.2">
      <FullProductName ProductID="postgresql95-test-9.5.4-1.2">postgresql95-test-9.5.4-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libecpg6-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libecpg6-9.5.4-1.2">libecpg6-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libecpg6-32bit-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2">libecpg6-32bit-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpq5-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpq5-9.5.4-1.2">libpq5-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libpq5-32bit-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2">libpq5-32bit-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-9.5.4-1.2">postgresql95-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-contrib-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2">postgresql95-contrib-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-devel-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2">postgresql95-devel-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-docs-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2">postgresql95-docs-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-plperl-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2">postgresql95-plperl-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-plpython-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2">postgresql95-plpython-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-pltcl-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2">postgresql95-pltcl-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-server-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2">postgresql95-server-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="postgresql95-test-9.5.4-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2">postgresql95-test-9.5.4-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.</Note>
    </Notes>
    <CVE>CVE-2007-4772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-4772.html</URL>
        <Description>CVE-2007-4772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/329282</URL>
        <Description>SUSE Bug 329282</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.</Note>
    </Notes>
    <CVE>CVE-2007-6600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2007-6600.html</URL>
        <Description>CVE-2007-6600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/329282</URL>
        <Description>SUSE Bug 329282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/537706</URL>
        <Description>SUSE Bug 537706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.</Note>
    </Notes>
    <CVE>CVE-2009-4034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4034.html</URL>
        <Description>CVE-2009-4034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564710</URL>
        <Description>SUSE Bug 564710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/603968</URL>
        <Description>SUSE Bug 603968</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.</Note>
    </Notes>
    <CVE>CVE-2009-4136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-4136.html</URL>
        <Description>CVE-2009-4136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564360</URL>
        <Description>SUSE Bug 564360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/603969</URL>
        <Description>SUSE Bug 603969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.</Note>
    </Notes>
    <CVE>CVE-2010-1169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1169.html</URL>
        <Description>CVE-2010-1169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/605926</URL>
        <Description>SUSE Bug 605926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/648140</URL>
        <Description>SUSE Bug 648140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.</Note>
    </Notes>
    <CVE>CVE-2010-1170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1170.html</URL>
        <Description>CVE-2010-1170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/605845</URL>
        <Description>SUSE Bug 605845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/605926</URL>
        <Description>SUSE Bug 605926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/634562</URL>
        <Description>SUSE Bug 634562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/648140</URL>
        <Description>SUSE Bug 648140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.</Note>
    </Notes>
    <CVE>CVE-2010-3433</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3433.html</URL>
        <Description>CVE-2010-3433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/643771</URL>
        <Description>SUSE Bug 643771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/648140</URL>
        <Description>SUSE Bug 648140</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.</Note>
    </Notes>
    <CVE>CVE-2012-0866</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0866.html</URL>
        <Description>CVE-2012-0866</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/701489</URL>
        <Description>SUSE Bug 701489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749299</URL>
        <Description>SUSE Bug 749299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749301</URL>
        <Description>SUSE Bug 749301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749303</URL>
        <Description>SUSE Bug 749303</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.</Note>
    </Notes>
    <CVE>CVE-2012-0867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0867.html</URL>
        <Description>CVE-2012-0867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/701489</URL>
        <Description>SUSE Bug 701489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749299</URL>
        <Description>SUSE Bug 749299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749301</URL>
        <Description>SUSE Bug 749301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749303</URL>
        <Description>SUSE Bug 749303</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.</Note>
    </Notes>
    <CVE>CVE-2012-0868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-0868.html</URL>
        <Description>CVE-2012-0868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/701489</URL>
        <Description>SUSE Bug 701489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749299</URL>
        <Description>SUSE Bug 749299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749301</URL>
        <Description>SUSE Bug 749301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/749303</URL>
        <Description>SUSE Bug 749303</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.</Note>
    </Notes>
    <CVE>CVE-2012-2143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2143.html</URL>
        <Description>CVE-2012-2143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/766797</URL>
        <Description>SUSE Bug 766797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/766798</URL>
        <Description>SUSE Bug 766798</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/766799</URL>
        <Description>SUSE Bug 766799</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.</Note>
    </Notes>
    <CVE>CVE-2012-2655</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2655.html</URL>
        <Description>CVE-2012-2655</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/765069</URL>
        <Description>SUSE Bug 765069</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.</Note>
    </Notes>
    <CVE>CVE-2012-3488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3488.html</URL>
        <Description>CVE-2012-3488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776523</URL>
        <Description>SUSE Bug 776523</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.</Note>
    </Notes>
    <CVE>CVE-2012-3489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3489.html</URL>
        <Description>CVE-2012-3489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776524</URL>
        <Description>SUSE Bug 776524</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.</Note>
    </Notes>
    <CVE>CVE-2013-0255</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0255.html</URL>
        <Description>CVE-2013-0255</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802679</URL>
        <Description>SUSE Bug 802679</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/803057</URL>
        <Description>SUSE Bug 803057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).</Note>
    </Notes>
    <CVE>CVE-2013-1899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1899.html</URL>
        <Description>CVE-2013-1899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/812525</URL>
        <Description>SUSE Bug 812525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."</Note>
    </Notes>
    <CVE>CVE-2013-1900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1900.html</URL>
        <Description>CVE-2013-1900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/812525</URL>
        <Description>SUSE Bug 812525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.</Note>
    </Notes>
    <CVE>CVE-2013-1901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1901.html</URL>
        <Description>CVE-2013-1901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/812525</URL>
        <Description>SUSE Bug 812525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.</Note>
    </Notes>
    <CVE>CVE-2014-0060</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0060.html</URL>
        <Description>CVE-2014-0060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864845</URL>
        <Description>SUSE Bug 864845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.</Note>
    </Notes>
    <CVE>CVE-2014-0061</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0061.html</URL>
        <Description>CVE-2014-0061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864846</URL>
        <Description>SUSE Bug 864846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.</Note>
    </Notes>
    <CVE>CVE-2014-0062</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0062.html</URL>
        <Description>CVE-2014-0062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864847</URL>
        <Description>SUSE Bug 864847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.</Note>
    </Notes>
    <CVE>CVE-2014-0063</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0063.html</URL>
        <Description>CVE-2014-0063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864850</URL>
        <Description>SUSE Bug 864850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.</Note>
    </Notes>
    <CVE>CVE-2014-0064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0064.html</URL>
        <Description>CVE-2014-0064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864851</URL>
        <Description>SUSE Bug 864851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871307</URL>
        <Description>SUSE Bug 871307</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.</Note>
    </Notes>
    <CVE>CVE-2014-0065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0065.html</URL>
        <Description>CVE-2014-0065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864852</URL>
        <Description>SUSE Bug 864852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-0066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0066.html</URL>
        <Description>CVE-2014-0066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864853</URL>
        <Description>SUSE Bug 864853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.</Note>
    </Notes>
    <CVE>CVE-2014-0067</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0067.html</URL>
        <Description>CVE-2014-0067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/864856</URL>
        <Description>SUSE Bug 864856</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/872783</URL>
        <Description>SUSE Bug 872783</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.</Note>
    </Notes>
    <CVE>CVE-2015-3165</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3165.html</URL>
        <Description>CVE-2015-3165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931972</URL>
        <Description>SUSE Bug 931972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931973</URL>
        <Description>SUSE Bug 931973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931974</URL>
        <Description>SUSE Bug 931974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932040</URL>
        <Description>SUSE Bug 932040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.</Note>
    </Notes>
    <CVE>CVE-2015-3166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3166.html</URL>
        <Description>CVE-2015-3166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931972</URL>
        <Description>SUSE Bug 931972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931973</URL>
        <Description>SUSE Bug 931973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931974</URL>
        <Description>SUSE Bug 931974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932040</URL>
        <Description>SUSE Bug 932040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.</Note>
    </Notes>
    <CVE>CVE-2015-3167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3167.html</URL>
        <Description>CVE-2015-3167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931972</URL>
        <Description>SUSE Bug 931972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931973</URL>
        <Description>SUSE Bug 931973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931974</URL>
        <Description>SUSE Bug 931974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932040</URL>
        <Description>SUSE Bug 932040</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.</Note>
    </Notes>
    <CVE>CVE-2015-5288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5288.html</URL>
        <Description>CVE-2015-5288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949669</URL>
        <Description>SUSE Bug 949669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949670</URL>
        <Description>SUSE Bug 949670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.</Note>
    </Notes>
    <CVE>CVE-2015-5289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5289.html</URL>
        <Description>CVE-2015-5289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949669</URL>
        <Description>SUSE Bug 949669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949670</URL>
        <Description>SUSE Bug 949670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2016-0766</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0766.html</URL>
        <Description>CVE-2016-0766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966435</URL>
        <Description>SUSE Bug 966435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966436</URL>
        <Description>SUSE Bug 966436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978323</URL>
        <Description>SUSE Bug 978323</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.</Note>
    </Notes>
    <CVE>CVE-2016-0773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0773.html</URL>
        <Description>CVE-2016-0773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966435</URL>
        <Description>SUSE Bug 966435</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/966436</URL>
        <Description>SUSE Bug 966436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978323</URL>
        <Description>SUSE Bug 978323</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983246</URL>
        <Description>SUSE Bug 983246</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986409</URL>
        <Description>SUSE Bug 986409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.</Note>
    </Notes>
    <CVE>CVE-2016-2193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2193.html</URL>
        <Description>CVE-2016-2193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978456</URL>
        <Description>SUSE Bug 978456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a BRIN index page.</Note>
    </Notes>
    <CVE>CVE-2016-3065</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3065.html</URL>
        <Description>CVE-2016-3065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/978456</URL>
        <Description>SUSE Bug 978456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.</Note>
    </Notes>
    <CVE>CVE-2016-5423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5423.html</URL>
        <Description>CVE-2016-5423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1041981</URL>
        <Description>SUSE Bug 1041981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042497</URL>
        <Description>SUSE Bug 1042497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052683</URL>
        <Description>SUSE Bug 1052683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993454</URL>
        <Description>SUSE Bug 993454</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.</Note>
    </Notes>
    <CVE>CVE-2016-5424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libecpg6-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libecpg6-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-32bit-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libpq5-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-contrib-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-devel-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-docs-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plperl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-plpython-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-pltcl-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-server-9.5.4-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:postgresql95-test-9.5.4-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.6</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5424.html</URL>
        <Description>CVE-2016-5424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1041981</URL>
        <Description>SUSE Bug 1041981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1042497</URL>
        <Description>SUSE Bug 1042497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1052683</URL>
        <Description>SUSE Bug 1052683</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993453</URL>
        <Description>SUSE Bug 993453</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
