File _patchinfo of Package patchinfo.424

<patchinfo incident="424">
  <issue id="888564" tracker="bnc"></issue>
  <issue id="916953" tracker="bnc"></issue>
  <issue id="CVE-2015-0241" tracker="cve" />
  <issue id="CVE-2015-0243" tracker="cve" />
  <issue id="CVE-2015-0244" tracker="cve" />
  <issue id="CVE-2014-8161" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>rmax</packager>
  <description>postgresql93 was updated to version 9.3.6 to fix four security issues.

These security issues were fixed:
- CVE-2015-0241: Fix buffer overruns in to_char() (bnc#916953).
- CVE-2015-0243: Fix buffer overruns in contrib/pgcrypto (bnc#916953).
- CVE-2015-0244: Fix possible loss of frontend/backend protocol synchronization after an error (bnc#916953).
- CVE-2014-8161: Fix information leak via constraint-violation error messages (bnc#916953).

This non-security issue was fixed:
- Move the server socket from /tmp to /var/run to avoid
  problems with clients that use PrivateTmp (bnc#888564).

More information is available at http://www.postgresql.org/docs/9.3/static/release-9-3-6.html
</description>
  <summary>Security update for postgresql93</summary>
</patchinfo>
openSUSE Build Service is sponsored by