Release date:
2022-10-19 15:18:52 UTC
Description:
* SECURITY UPDATE: Privileged arbitrary SQL function execution
- debian/patches/CVE-2022-1552-1.patch: Make relation-enumerating
operations be security-restricted operations
- debian/patches/CVE-2022-1552-2.patch: In REFRESH MATERIALIZED VIEW,
set user ID before running user code
- CVE-2022-1552
Updated packages:
-
libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:22ad8b19efea1803f3678f588d7149e0ead166a2
-
libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:2c7f43fa794c1b67c72071b49a7abed64430d5af
-
libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:730d4225f6660520bb9dcfaede1105c285b60071
-
libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:b7c7cf5431dddb517e7c2ba00881d164db2e3384
-
libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:78d3d1e75c20b5cb997c83d862a5484860ca6d83
-
libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:3d913c503d810f58b474e0f7b2392644e3290d20
-
postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:e7b75d1e4813917f8db6b6f431d0b4b97acf74d8
-
postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:8a026160b294f2eddba7d562d9771582b55e683d
-
postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:48fb9c0981fc2fb636d882b2a6835e20393438ec
-
postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_all.deb
sha:e451b29e82f219d672062d88d72862083731fc6b
-
postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:e80de868f8e7ecd74b36799608bb60da0fcf93e7
-
postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:aba74fa6c795dca3d0f233fbc387589b81e362ee
-
postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:f766b89b1bbb0a49f97bb6a78898e4327b3104ff
-
postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:9ebc4443d9cf0a42fb99caf6a42abd1330c30897
-
postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els3_amd64.deb
sha:a452e945aaa6459883bc3eeb82c7033bc0910180
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.