<itemizedlist>
+ <listitem>
+ <para>
+ Fix insecure parsing of server command-line switches (Mitsumasa
+ Kondo, Kyotaro Horiguchi)
+ </para>
+
+ <para>
+ A connection request containing a database name that begins with
+ <quote><literal>-</></quote> could be crafted to damage or destroy
+ files within the server's data directory, even if the request is
+ eventually rejected. (CVE-2013-1899)
+ </para>
+ </listitem>
+
<listitem>
<para>
Reset OpenSSL randomness state in each postmaster child process
<itemizedlist>
+ <listitem>
+ <para>
+ Fix insecure parsing of server command-line switches (Mitsumasa
+ Kondo, Kyotaro Horiguchi)
+ </para>
+
+ <para>
+ A connection request containing a database name that begins with
+ <quote><literal>-</></quote> could be crafted to damage or destroy
+ files within the server's data directory, even if the request is
+ eventually rejected. (CVE-2013-1899)
+ </para>
+ </listitem>
+
<listitem>
<para>
Reset OpenSSL randomness state in each postmaster child process
</para>
</listitem>
+ <listitem>
+ <para>
+ Make REPLICATION privilege checks test current user not authenticated
+ user (Noah Misch)
+ </para>
+
+ <para>
+ An unprivileged database user could exploit this mistake to call
+ <function>pg_start_backup()</> or <function>pg_stop_backup()</>,
+ thus possibly interfering with creation of routine backups.
+ (CVE-2013-1901)
+ </para>
+ </listitem>
+
<listitem>
<para>
Fix GiST indexes to not use <quote>fuzzy</> geometric comparisons when
<itemizedlist>
+ <listitem>
+ <para>
+ Fix insecure parsing of server command-line switches (Mitsumasa
+ Kondo, Kyotaro Horiguchi)
+ </para>
+
+ <para>
+ A connection request containing a database name that begins with
+ <quote><literal>-</></quote> could be crafted to damage or destroy
+ files within the server's data directory, even if the request is
+ eventually rejected. (CVE-2013-1899)
+ </para>
+ </listitem>
+
<listitem>
<para>
Reset OpenSSL randomness state in each postmaster child process
</para>
</listitem>
+ <listitem>
+ <para>
+ Make REPLICATION privilege checks test current user not authenticated
+ user (Noah Misch)
+ </para>
+
+ <para>
+ An unprivileged database user could exploit this mistake to call
+ <function>pg_start_backup()</> or <function>pg_stop_backup()</>,
+ thus possibly interfering with creation of routine backups.
+ (CVE-2013-1901)
+ </para>
+ </listitem>
+
<listitem>
<para>
Fix GiST indexes to not use <quote>fuzzy</> geometric comparisons when