[CLSA-2022:1657814447] Fix CVE(s): CVE-2021-23214
Type:
security
Severity:
Important
Release date:
2022-07-14 16:00:47 UTC
Description:
* SECURITY UPDATE: MITM attack introducing arbitrary SQL quieries - debian/patches/CVE-2021-23214.patch: Raise error if data was received during SSL handshake - CVE-2021-23214
Updated packages:
  • libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:ce1db2f64a93b7eeb6eb0f970bbb016db8701bce
  • libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:3aa306e1636d2124e57bcc172cddc29ebb09935f
  • libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:b6b015963fa65f9adcc01e217ca99471d4bc0728
  • libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:2b9698a425c7a61e4f99d8d1bce7732311502dc9
  • libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:f3f5300372b51d70d38770e7662037aaaa22cfd4
  • libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:cc35fbf39579f142fd1770b545c083b9b8f0a142
  • postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:c55fd9b31f4a4d366f3cf1949ff7b8216059a53d
  • postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:720f4c6e186da7efb0ebcbafe2ec99505ba857e7
  • postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:34efa0a0e54b0eb539750a2a98e06b0e0da3d11f
  • postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_all.deb
    sha:315059395c243d81ffdfec0a72b1f2f4d4c0e35a
  • postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:549103aa65f672973e7f39e749e10d924603f258
  • postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:d0c750295f08052eb18131735e274d71931a46b4
  • postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:ed4d33058ad8b21753741df4dd26391a54ab2819
  • postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:02271f3e16c4c680a02a224df4ce70089a76da4b
  • postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els1_amd64.deb
    sha:6a5ee775ad04407706e4894a9779a87d0266fc51
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.