File _patchinfo of Package patchinfo

<patchinfo incident="104">
  <packager>lijews</packager>
  <issue tracker="cve" id="CVE-2013-1901"></issue>
  <issue tracker="cve" id="CVE-2013-1900"></issue>
  <issue tracker="cve" id="CVE-2013-1899"></issue>
  <issue tracker="bnc" id="812525">VUL-0: postgresql april 4 security update</issue>
  <category>security</category>
  <rating>important</rating>
  <summary>postgresql: security and bugfix update to 9.0.13</summary>
  <description>Postgresql was updated to version 9.0.13 (bnc#812525):
  * CVE-2013-1899: Fix insecure parsing of server command-line switches. A connection request containing a database name that begins with "-" could be crafted to damage or destroy files within the server's data directory, even if the request is eventually rejected.
   * CVE-2013-1900: Reset OpenSSL randomness state in each postmaster child process. This avoids a scenario wherein random numbers generated by "contrib/pgcrypto" functions might be relatively easy for another database user to guess. The risk is only significant when the postmaster is configured with ssl = on but most connections don't use SSL encryption.
   * CVE-2013-1901: Make REPLICATION privilege checks test current user not authenticated user. An unprivileged database user could exploit this mistake to call pg_start_backup() or pg_stop_backup(), thus possibly interfering with creation of routine backups.
   * See the release notes for the rest of the changes:
   http://www.postgresql.org/docs/9.0/static/release-9-0-13.html
   /usr/share/doc/packages/postgresql91/HISTORY
</description>
</patchinfo>
openSUSE Build Service is sponsored by