File _patchinfo of Package patchinfo
<patchinfo incident="104"> <packager>lijews</packager> <issue tracker="cve" id="CVE-2013-1901"></issue> <issue tracker="cve" id="CVE-2013-1900"></issue> <issue tracker="cve" id="CVE-2013-1899"></issue> <issue tracker="bnc" id="812525">VUL-0: postgresql april 4 security update</issue> <category>security</category> <rating>important</rating> <summary>postgresql: security and bugfix update to 9.0.13</summary> <description>Postgresql was updated to version 9.0.13 (bnc#812525): * CVE-2013-1899: Fix insecure parsing of server command-line switches. A connection request containing a database name that begins with "-" could be crafted to damage or destroy files within the server's data directory, even if the request is eventually rejected. * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster child process. This avoids a scenario wherein random numbers generated by "contrib/pgcrypto" functions might be relatively easy for another database user to guess. The risk is only significant when the postmaster is configured with ssl = on but most connections don't use SSL encryption. * CVE-2013-1901: Make REPLICATION privilege checks test current user not authenticated user. An unprivileged database user could exploit this mistake to call pg_start_backup() or pg_stop_backup(), thus possibly interfering with creation of routine backups. * See the release notes for the rest of the changes: http://www.postgresql.org/docs/9.0/static/release-9-0-13.html /usr/share/doc/packages/postgresql91/HISTORY </description> </patchinfo>