<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455 in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/ta-p/2071306</link>
    <description>&lt;P&gt;PostgreSQL has identified two security issues. As Qlik Sense Enterprise on Windows relies on PostgreSQL for its repository, we want to provide you with steps on how to mitigate the vulnerabilities.&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://www.postgresql.org/support/security/CVE-2023-2454/" target="_self"&gt;&lt;SPAN&gt;CVE-2023-2454&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This enabled an attacker having database-level&amp;nbsp;&lt;CODE&gt;CREATE&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;privilege to execute arbitrary code as the bootstrap superuser. Database owners have that right by default, and explicit grants may extend it to other users.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.postgresql.org/support/security/CVE-2023-2455/" target="_self"&gt;&lt;SPAN&gt;CVE-2023-2455&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;While&amp;nbsp;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.postgresql.org/support/security/CVE-2016-2193/" target="_blank" rel="noopener"&gt;CVE-2016-2193&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;fixed most interaction between row security and user ID changes, it missed a scenario involving function inlining. This leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;SET ROLE&lt;/CODE&gt;&lt;SPAN&gt;s. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.postgresql.org/docs/current/sql-createpolicy.html" target="_blank" rel="noopener"&gt;&lt;CODE&gt;CREATE POLICY&lt;/CODE&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;to define a row security policy.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;With the next &lt;EM&gt;major&amp;nbsp;&lt;/EM&gt;Qlik Sense Enterprise on Windows release (&lt;FONT color="#339966"&gt;&lt;STRONG&gt;August 2023&lt;/STRONG&gt;&lt;/FONT&gt;),&amp;nbsp;Qlik will update its bundled PostgreSQL database to the latest 14.x version.&lt;/P&gt;
&lt;P&gt;As a mitigation for any previous releases, including May 2023, we offer the Qlik Postgres Installer (QPI) to migrate from 9.6 or 12.5 embedded databases to 14.8. We validated PostgreSQL 14.x for all releases back to February 2022.&lt;/P&gt;
&lt;P&gt;Download the Qlik Postgres Installer versions 1.3.0 &lt;A href="https://github.com/qlik-download/qlik-postgresql-installer/releases/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;There are two possible scenarios which may apply to you:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Scenario 1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Upgrading your PostgreSQL database for Qlik Sense February 2022 (or later) while not having used the QPI yet&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H5&gt;
&lt;P data-unlink="true"&gt;Use the &lt;STRONG&gt;new&amp;nbsp;&lt;/STRONG&gt;Qlik Postgres Installer (version &lt;STRONG&gt;1.3.0&lt;/STRONG&gt;) to upgrade to Postgres &lt;STRONG&gt;14.8&lt;/STRONG&gt; and migrate Postgres with QPI.&amp;nbsp;Follow the instructions in &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Upgrading-Qlik-Sense-Repository-Database-from-PostgreSQL-9-6-to/ta-p/1934238" target="_blank" rel="noopener"&gt;Upgrading Qlik Sense Repository Database using the Qlik PostgreSQL Installer&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Download the Qlik Postgres Installer versions 1.3.0 &lt;A href="https://github.com/qlik-download/qlik-postgresql-installer/releases/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H4 data-unlink="true"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-unlink="true"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;H5 data-unlink="true"&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Upgrading your PostgreSQL on February 2022 (or later) if you have already migrated to 12.x within QPI &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;If you have previously used the Qlik Postgres Installer (version 1.2.1 or earlier), you can simply install the latest PostgreSQL version (within your major release) and install it on top of your current 12.x database. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Steps:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;Download the latest P&lt;/SPAN&gt;ostgreSQL installer within the major release you have installed (&lt;A href="https://www.enterprisedb.com/downloads/postgres-postgresql-downloads" target="_blank" rel="noopener"&gt;Download PostgreSQL | Enterprisedb.com&lt;/A&gt;).&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Example: You have used the old QPI to upgrade to 12.&lt;STRONG&gt;5&lt;/STRONG&gt;. You can now easily upgrade to a later version in the &lt;EM&gt;same major release&lt;/EM&gt;, such as&amp;nbsp;12.&lt;STRONG&gt;15&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Stop the Qlik Sense services. Leave the &lt;FONT face="courier new,courier"&gt;postgresql-x64-12&lt;/FONT&gt; service running.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Run the downloaded installer&amp;nbsp;&lt;STRONG&gt;as an&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;administrator&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;The installer will guide you through the upgrade procedure.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Start the Qlik Sense services.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Related Content&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://www.cybersecurity-help.cz/vdb/SB2023051138" target="_self"&gt;https://www.cybersecurity-help.cz/vdb/SB2023051138&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.enterprisedb.com/downloads/postgres-postgresql-downloads" target="_blank" rel="noopener"&gt;Download PostgreSQL | Enterprisedb.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Qlik Sense Enterprise on Windows all versions&lt;/P&gt;</description>
    <pubDate>Wed, 31 May 2023 09:35:57 GMT</pubDate>
    <dc:creator>Sebastian_Linser</dc:creator>
    <dc:date>2023-05-31T09:35:57Z</dc:date>
    <item>
      <title>Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/ta-p/2071306</link>
      <description>&lt;P&gt;PostgreSQL has identified two security issues. As Qlik Sense Enterprise on Windows relies on PostgreSQL for its repository, we want to provide you with steps on how to mitigate the vulnerabilities.&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;A href="https://www.postgresql.org/support/security/CVE-2023-2454/" target="_self"&gt;&lt;SPAN&gt;CVE-2023-2454&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This enabled an attacker having database-level&amp;nbsp;&lt;CODE&gt;CREATE&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;privilege to execute arbitrary code as the bootstrap superuser. Database owners have that right by default, and explicit grants may extend it to other users.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.postgresql.org/support/security/CVE-2023-2455/" target="_self"&gt;&lt;SPAN&gt;CVE-2023-2455&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;While&amp;nbsp;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.postgresql.org/support/security/CVE-2016-2193/" target="_blank" rel="noopener"&gt;CVE-2016-2193&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;fixed most interaction between row security and user ID changes, it missed a scenario involving function inlining. This leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;SET ROLE&lt;/CODE&gt;&lt;SPAN&gt;s. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://www.postgresql.org/docs/current/sql-createpolicy.html" target="_blank" rel="noopener"&gt;&lt;CODE&gt;CREATE POLICY&lt;/CODE&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;to define a row security policy.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;With the next &lt;EM&gt;major&amp;nbsp;&lt;/EM&gt;Qlik Sense Enterprise on Windows release (&lt;FONT color="#339966"&gt;&lt;STRONG&gt;August 2023&lt;/STRONG&gt;&lt;/FONT&gt;),&amp;nbsp;Qlik will update its bundled PostgreSQL database to the latest 14.x version.&lt;/P&gt;
&lt;P&gt;As a mitigation for any previous releases, including May 2023, we offer the Qlik Postgres Installer (QPI) to migrate from 9.6 or 12.5 embedded databases to 14.8. We validated PostgreSQL 14.x for all releases back to February 2022.&lt;/P&gt;
&lt;P&gt;Download the Qlik Postgres Installer versions 1.3.0 &lt;A href="https://github.com/qlik-download/qlik-postgresql-installer/releases/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;There are two possible scenarios which may apply to you:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Scenario 1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;H5&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Upgrading your PostgreSQL database for Qlik Sense February 2022 (or later) while not having used the QPI yet&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H5&gt;
&lt;P data-unlink="true"&gt;Use the &lt;STRONG&gt;new&amp;nbsp;&lt;/STRONG&gt;Qlik Postgres Installer (version &lt;STRONG&gt;1.3.0&lt;/STRONG&gt;) to upgrade to Postgres &lt;STRONG&gt;14.8&lt;/STRONG&gt; and migrate Postgres with QPI.&amp;nbsp;Follow the instructions in &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Upgrading-Qlik-Sense-Repository-Database-from-PostgreSQL-9-6-to/ta-p/1934238" target="_blank" rel="noopener"&gt;Upgrading Qlik Sense Repository Database using the Qlik PostgreSQL Installer&lt;/A&gt;.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Download the Qlik Postgres Installer versions 1.3.0 &lt;A href="https://github.com/qlik-download/qlik-postgresql-installer/releases/" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;H4 data-unlink="true"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-unlink="true"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Scenario 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;H5 data-unlink="true"&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Upgrading your PostgreSQL on February 2022 (or later) if you have already migrated to 12.x within QPI &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;If you have previously used the Qlik Postgres Installer (version 1.2.1 or earlier), you can simply install the latest PostgreSQL version (within your major release) and install it on top of your current 12.x database. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Steps:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-unlink="true"&gt;&lt;SPAN&gt;Download the latest P&lt;/SPAN&gt;ostgreSQL installer within the major release you have installed (&lt;A href="https://www.enterprisedb.com/downloads/postgres-postgresql-downloads" target="_blank" rel="noopener"&gt;Download PostgreSQL | Enterprisedb.com&lt;/A&gt;).&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Example: You have used the old QPI to upgrade to 12.&lt;STRONG&gt;5&lt;/STRONG&gt;. You can now easily upgrade to a later version in the &lt;EM&gt;same major release&lt;/EM&gt;, such as&amp;nbsp;12.&lt;STRONG&gt;15&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Stop the Qlik Sense services. Leave the &lt;FONT face="courier new,courier"&gt;postgresql-x64-12&lt;/FONT&gt; service running.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Run the downloaded installer&amp;nbsp;&lt;STRONG&gt;as an&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;administrator&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;The installer will guide you through the upgrade procedure.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-unlink="true"&gt;Start the Qlik Sense services.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Related Content&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://www.cybersecurity-help.cz/vdb/SB2023051138" target="_self"&gt;https://www.cybersecurity-help.cz/vdb/SB2023051138&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.enterprisedb.com/downloads/postgres-postgresql-downloads" target="_blank" rel="noopener"&gt;Download PostgreSQL | Enterprisedb.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Qlik Sense Enterprise on Windows all versions&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 09:35:57 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/ta-p/2071306</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2023-05-31T09:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073640#M9280</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/19162"&gt;@Sebastian_Linser&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for this message.&lt;/P&gt;
&lt;P&gt;With both scenario, at the end, we do not have Qlik Sense Repository Database service anymore.&lt;/P&gt;
&lt;P&gt;as a Scenario 3, will it be possible, to wait untill August 2023 and then, make a backup of certificates and database, unisntall qlik sense, install the brand new version with postgres 14.8 and then restore ?&lt;/P&gt;
&lt;P&gt;Or do you think, it will be a better solution, for the future to have&amp;nbsp;&lt;SPAN&gt;postgresql-x64-12 service running ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have a good week&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Johann&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 07:16:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073640#M9280</guid>
      <dc:creator>jchoucq</dc:creator>
      <dc:date>2023-05-22T07:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073710#M9281</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/14334"&gt;@jchoucq&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Qlik is providing you with the means to mitigate the vulnerability identified by Postgre. It is up to you whether you are willing to accept the risks and wait, though we will always recommend doing so&amp;nbsp;&lt;STRONG&gt;as soon as possible&lt;/STRONG&gt;. The choice is yours, however.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 09:18:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073710#M9281</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-05-22T09:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073904#M9288</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do agree with what you said.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But for my experience, in 2 different environments, QPI failed, and we had to upgrade from 9.6 to 12.50 manually (bakup and restore) with the advantage, however, of keeping the same old configuration, with Qlik Sense Repository Database Service.&lt;/P&gt;
&lt;P&gt;For the moment, it won't be possible, until Qlik Sense August 2023 is released.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Johann&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 14:03:45 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073904#M9288</guid>
      <dc:creator>jchoucq</dc:creator>
      <dc:date>2023-05-22T14:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073954#M9290</link>
      <description>&lt;P&gt;Thanks would this impact NPrinting in some way too?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 15:45:25 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2073954#M9290</guid>
      <dc:creator>Giovanni_Civardi</dc:creator>
      <dc:date>2023-05-22T15:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2074143#M9294</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/129471"&gt;@Giovanni_Civardi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our Qlik NPrinting team is currently actively reviewing this.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 06:10:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2074143#M9294</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-05-23T06:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084408#M9458</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in a scenario where we already used QPI to migrate postgresql from 9.6 to 12.5, will it be possible to upgrade to postgresql 14.8 ?&lt;/P&gt;
&lt;P&gt;Thanks a lot and have a good day.&lt;/P&gt;
&lt;P&gt;Joh&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 15:36:17 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084408#M9458</guid>
      <dc:creator>jchoucq</dc:creator>
      <dc:date>2023-06-15T15:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084792#M9460</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/14334"&gt;@jchoucq&lt;/a&gt;&amp;nbsp;not with the tool, but I will soon have a manual way done for you.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 12:29:30 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084792#M9460</guid>
      <dc:creator>Sebastian_Linser</dc:creator>
      <dc:date>2023-06-16T12:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084845#M9462</link>
      <description>&lt;P&gt;Sounds great to hear, thank you very much&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/19162"&gt;@Sebastian_Linser&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 14:22:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084845#M9462</guid>
      <dc:creator>jchoucq</dc:creator>
      <dc:date>2023-06-16T14:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084935#M9464</link>
      <description>&lt;P&gt;We followed Scenario 2 (v12.5 to v12.15) and while there were no errors during the upgrade, after finished we could not access Qlik Sense (Feb 2023 SR 5) Hub or QMC. I am planning on submitting a ticket, but first wanted to ask if anyone else has run into this problem?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 18:42:15 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2084935#M9464</guid>
      <dc:creator>ChristiW</dc:creator>
      <dc:date>2023-06-16T18:42:15Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2085310#M9477</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/145392"&gt;@ChristiW&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recommend a support ticket so that we can assist you directly.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 13:08:11 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2085310#M9477</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-06-19T13:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2090230#M9611</link>
      <description>&lt;P&gt;any update on NPrinting side? thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 08:19:35 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2090230#M9611</guid>
      <dc:creator>Giovanni_Civardi</dc:creator>
      <dc:date>2023-07-04T08:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2090232#M9612</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/129471"&gt;@Giovanni_Civardi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Starting from the next Qlik NPrinting service release (May 2023&amp;nbsp;SR1) the installed PostgreSQL version will be 13.11-2 instead of 13.8-1. We encourage you to upgrade Qlik NPrinting, as Qlik NPrinting upgrades its PostgreSQL version as well.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2023 08:24:36 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2090232#M9612</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-07-04T08:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2114909#M10103</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can i restore 9.6 postgres repository on freshly installed qlik sense enterprise version Aug 2023 (which by defalut comes with postgres 14.5 version)&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 09:51:36 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2114909#M10103</guid>
      <dc:creator>BoB_Qlik_Support</dc:creator>
      <dc:date>2023-09-08T09:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Sense Enterprise on Windows: PostgreSQL vulnerabilities CVE-2023-2454 and CVE-2023-2455</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2115995#M10143</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/72054"&gt;@BoB_Qlik_Support&lt;/a&gt;&amp;nbsp;This is possible, although an error may be logged (see&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-to-manually-upgrade-the-bundled-Qlik-Sense-PostgreSQL/ta-p/1820358#:~:text=of%20the%20installer.-,Step%205%3A%20Restoring%20your%20Qlik%20Sense%20site,-You%20now%20have" target="_blank" rel="noopener"&gt;Restoring your Qlik Sense site (How to manually upgrade the bundled Qlik Sense PostgreSQL version to 12.5 version)&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 12:31:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-PostgreSQL-vulnerabilities-CVE/tac-p/2115995#M10143</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-09-12T12:31:24Z</dc:date>
    </item>
  </channel>
</rss>

