[CLSA-2022:1665428667] Fix CVE(s): CVE-2021-32027
Type:
security
Severity:
Important
Release date:
2022-10-10 19:04:27 UTC
Description:
* SECURITY UPDATE: Buffer overrun from integer overflow - debian/patches/CVE-2021-32027.patch: Prevent integer overflows in array subscripting calculations - CVE-2021-32027
Updated packages:
  • libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:f765e7e5ae107d08c3b9829e243eacef249019d0
  • libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:d667760448586d92ab4802994c9b8a9a9a98baea
  • libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:862deb9d531566f3bc0369528458af4bff69c83b
  • libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:362067e7d8eb1f3b145eab5f40d4dbe2b8154228
  • libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:fddecfaa79653501bc5d2a2a4d22eb6825d90fe7
  • libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:eb26dd0e037b28a3772c783fb1f77f54cb2381d8
  • postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:39e50ee30e079232d87fad6702c79ad3c331fd96
  • postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:df56b655d3e4f9414f4f4128f23560d2b9f6600f
  • postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:b6e3aef4044d98ef0e7432526b27f790fdde65cb
  • postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_all.deb
    sha:900b6a37a6a3b1b8d523eb2a236f68d0979ab794
  • postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:dc3923b7e147bf0d90317e799abcbdbcfecfe0be
  • postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:3d251d327f8f1f1bb251433c0032f627200fc578
  • postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:e2ebf51d56423343643eddbd8f1bd42367ef8043
  • postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:2ea40a47e186b008eacd7d74b1faf6d539d42197
  • postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els2_amd64.deb
    sha:72ab09e03dcf537f6753aa6d0c855c4de6815bc1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.