ea28815591
A major security issue fixed in this release, CVE-2013-1899, makes it possible for a connection request containing a database name that begins with "-" to be crafted that can damage or destroy files within a server's data directory. Anyone with access to the port the PostgreSQL server listens on can initiate this request. Two lesser security fixes are also included in this release: CVE-2013-1900, wherein random numbers generated by contrib/pgcrypto functions may be easy for another database user to guess, and CVE-2013-1901, which mistakenly allows an unprivileged user to run commands that could interfere with in-progress backups. Finally, this release fixes two security issues with the graphical installers for Linux and Mac OS X: insecure passing of superuser passwords to a script, CVE-2013-1903 and the use of predictable filenames in /tmp CVE-2013-1902. |
||
---|---|---|
.. | ||
patch-config_missing | ||
patch-config_perl.m4 | ||
patch-configure | ||
patch-contrib_dblink_dblink.c | ||
patch-contrib_dblink_Makefile | ||
patch-src_backend_Makefile | ||
patch-src_Makefile.shlib | ||
patch-src_makefiles_Makefile.solaris | ||
patch-src_pl_plperl_GNUmakefile | ||
patch-src_pl_plperl_plperl.h | ||
patch-src_timezone_localtime.c | ||
patch-src_timezone_private.h | ||
patch-src_timezone_strftime.c | ||
patch-src_timezone_zic.c |