postgresql92: Various security fixes. Update to 9.2.4.

postgresql was updated to version 9.2.4 (bnc#812525):
* CVE-2013-1899: Fix insecure parsing of server command-line
switches. A connection request containing a database name that
begins with "-" could be crafted to damage or destroy files
within the server's data directory, even if the request is
eventually rejected.
* CVE-2013-1900: Reset OpenSSL randomness state in each
postmaster child process. This avoids a scenario wherein
random numbers generated by "contrib/pgcrypto" functions might
be relatively easy for another database user to guess. The
risk is only significant when the postmaster is configured
with ssl = on but most connections don't use SSL encryption.
* CVE-2013-1901: Make REPLICATION privilege checks test current
user not authenticated user. An unprivileged database user
could exploit this mistake to call pg_start_backup() or
pg_stop_backup(), thus possibly interfering with creation of
routine backups.
* See the release notes for the rest of the changes:
http://www.postgresql.org/docs/9.2/static/release-9-2-4.html
/usr/share/doc/packages/postgresql92/HISTORY

Fixed bugs
bnc#812525
VUL-0: EMBARGOED: postgresql april 4 security update
Selected Binaries
openSUSE Build Service is sponsored by