Release date:
2024-02-08 19:28:30 UTC
Description:
* SECURITY UPDATE: A flaw was found in PostgreSQL that allows authenticated database
users to execute arbitrary code through missing overflow checks during SQL array
value modification.
- debian/patches/CVE-2023-5869.patch: Detect integer overflow while computing
new array dimensions.
- CVE-2023-5869
Updated packages:
-
libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:92db160c0eac3c1c5c282e58e998e271216b864c
-
libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:e5f2d968d8ae114c5a59d3da5c878c1af447aac4
-
libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:ed3d63ada8df36fec739db11ba31f1be79388b74
-
libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:75d55a13455cd84eeb18be6e441797ba6942baeb
-
libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:3b703725059364e7b8320a6e422d3d762918110f
-
libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:9a50fea6f3a7e15fc5693958df4798b537369c14
-
postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:a2e9d772d3fe83a1cf2691a0a6b704d0db6b9fb6
-
postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:c0d7b7211b8f4ed9aef4c5cd4ecf7ce41308dccf
-
postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:ba5407e9cd3c75d474b797799984a6545d59ccc0
-
postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_all.deb
sha:03c9674032cd61f652a7705c785bf2466838c3d7
-
postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:54c959eb38be8793803f51c6b7e4ea8539a017ad
-
postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:48870419c7cd545ccf91f13bf7c57949a006c1ea
-
postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:f92cd5dd4019e42ae18f97eba1fad7f4fdbd6a47
-
postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:a9c60c1df28547c10c9b40316665b2b959ad9271
-
postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els6_amd64.deb
sha:bcca4ebd40b832c91f8ddbff8009a619adb86c02
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.