[CLSA-2024:1712837808] postgresql: Fix of CVE-2021-23214
Type:
security
Severity:
Important
Release date:
2024-04-11 12:16:52 UTC
Description:
- CVE-2021-23214: Reject extraneous data after SSL or GSS encryption handshake
Updated packages:
  • postgresql-9.2.24-9.el7_9.tuxcare.els1.i686.rpm
    sha:a6b1cd3f538346f4fea68aea350c14f4a2dadf6a
  • postgresql-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:d56882e00cb0ecd1f213f3f7007c1bc4323312ae
  • postgresql-contrib-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:bf22f1e52cb2a8aaacc1bb887e6758a5c73e0f56
  • postgresql-devel-9.2.24-9.el7_9.tuxcare.els1.i686.rpm
    sha:36fda0db50c7d743034f9685aa36c69ef26e96ac
  • postgresql-devel-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:2bb7a53367d6290520ca77b3b54059b96d73e54b
  • postgresql-docs-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:bddb74800410ea4c06bc7b5b30fde00b43fcc11f
  • postgresql-libs-9.2.24-9.el7_9.tuxcare.els1.i686.rpm
    sha:a3d9b40edfbdbd64aa74fbe3ecac3db996f431b4
  • postgresql-libs-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:e5af55ea2903778f50d721d93c70f5ee9c7f3560
  • postgresql-plperl-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:61337e67a8738fafa0004325aed6f301c7ae732d
  • postgresql-plpython-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:dc364b71d69ef21c93aa0d3e47145a205ecbcebf
  • postgresql-pltcl-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:6d852b9ff60abb95a8b77b59a1ff787a7cae0c4d
  • postgresql-server-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:1fcce3936a27279acc29c3c4269aaf87896cabe5
  • postgresql-static-9.2.24-9.el7_9.tuxcare.els1.i686.rpm
    sha:e2e4e378702a057da09de185da073f742d3a16c3
  • postgresql-static-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:360345bdff1478b1bdf702559d2db6d1a02dc2ce
  • postgresql-test-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:968753e1c0f53c5e2b835c7583e92c3850a72da2
  • postgresql-upgrade-9.2.24-9.el7_9.tuxcare.els1.x86_64.rpm
    sha:44d819a1f3031a0342654b8f13a51c70d1a688f7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.