Release date:
2023-09-21 18:12:05 UTC
Description:
* SECURITY UPDATE: Extension script @substitutions@ within quoting allow SQL injection
- debian/patches/CVE-2023-39417.patch: filter each substitution through
quote_identifier()
- CVE-2023-39417
Updated packages:
-
libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:beebe48bdced33b6bcc1ffc604b87c554b73a475
-
libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:ab6b6452b899fdc18253f9676c55062671885b1e
-
libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:c7a26c50d747a6012d85ae49ad1b812ebf1805c4
-
libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:50901b2845f4053eba4b3e408abd94df60596d8e
-
libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:9799c1bb38faec232d70f4baea0b3c724e0ac52d
-
libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:3b74957565f0eaf08a9b348e415053bc6504c5cd
-
postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:95fdeaffa263ca7b82ab67b8c603d381f2b940f0
-
postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:117b7633617a8b464d4dd997d87414bd034c1549
-
postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:c08edf181538b453b0838ffd80a97f3f8fcb3655
-
postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_all.deb
sha:377a3b909cfba7737f9a92ef644ab820f4d5c63f
-
postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:63a10184f9cb2020b31f694b9537c3af20afd8bc
-
postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:d5260b6d3509728a9c9f50183ff4ce5fb901fecc
-
postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:f5a73d06fca9c3ba2ec3573efe49554c72216f87
-
postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:0095f67d71bea7bcb868039dd260e5ba0ef76ca6
-
postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els5_amd64.deb
sha:af488a5d32fb2fc55b35230f1c72b50840f55fc1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.