Release date:
2022-12-15 17:15:08 UTC
Description:
* SECURITY UPDATE: A man-in-the-middle attacker can inject false responses
- debian/patches/CVE-2021-23222.patch: libpq: reject extraneous data after
SSL or GSS encryption handshake
- CVE-2021-23222
Updated packages:
-
libecpg-compat3_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:a3b545611157c525b38b9a6b851b391ee043b65b
-
libecpg-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:ca5325ff5cfab57e29febd651dfb406900c7d922
-
libecpg6_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:7d90d7d786f73dae685c1dfff27da8fe5e073643
-
libpgtypes3_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:5f9b2cf9e060b86bd75f69c708330db095a9bece
-
libpq-dev_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:5ba0273e7778f6fa8f15b290aea1eb5b49c968eb
-
libpq5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:4c74e254ba1b9788cbfa2f7e8d5e629c4acfd7ee
-
postgresql-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:fdd90ba598b15b7ef9e798c13ad38d1ff9b62c44
-
postgresql-client-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:ae4ebc73016a15a976ac737c884788ee431bb5fa
-
postgresql-contrib-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:6d203486b572fe461df08701b5e350fc83b34b8d
-
postgresql-doc-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_all.deb
sha:348bcaa0b54642781c50096cf17012d704fa954c
-
postgresql-plperl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:b71e40c9e1e843e012382f5cc5e0f2d7a0a40dc4
-
postgresql-plpython-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:dbf15f5a8fc3337bbf7856f56d51affd98e917ec
-
postgresql-plpython3-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:a821e5a11ac3cc232fd3ec85db26b842d3565054
-
postgresql-pltcl-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:697edb928da26f51de201b82a9548adad98ac21b
-
postgresql-server-dev-9.5_9.5.25-0ubuntu0.16.04.1+tuxcare.els4_amd64.deb
sha:65f905289a5cb8e933807799679c2032fe5d9ccb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.