Security update for postgresql94

This update for postgresql94 to 9.4.19 fixes the following security issue:

- CVE-2018-10915: libpq failed to properly reset its internal state between
connections. If an affected version of libpq was used with "host" or "hostaddr"
connection parameters from untrusted input, attackers could have bypassed
client-side connection security features, obtain access to higher privileged
connections or potentially cause other impact SQL injection, by causing the
PQescape() functions to malfunction (bsc#1104199).

A dump/restore is not required for this update unless you use
the functions query_to_xml, cursor_to_xml, cursor_to_xmlschema,
query_to_xmlschema, and query_to_xml_and_xmlschema. In this case please see
the first entry of https://www.postgresql.org/docs/9.4/static/release-9-4-18.html

This update was imported from the SUSE:SLE-12:Update update project.

Message

Additional post-update DBA actions may be required if the following functions are used:
query_to_xml, cursor_to_xml, cursor_to_xmlschema, query_to_xmlschema, query_to_xml_and_xmlschema
See the first entry on https://www.postgresql.org/docs/9.4/static/release-9-4-18.html

Fixed bugs
bnc#1104199
VUL-0: CVE-2018-10915: postgresql94,postgresql96,postgresql10: Fix failure to reset libpq's state fully between connection attempts
Selected Binaries
openSUSE Build Service is sponsored by