[CLSA-2025:1742471100] Fix CVE(s): CVE-2025-1094
Type:
security
Severity:
Important
Release date:
2025-03-20 11:45:05 UTC
Description:
* SECURITY UPDATE: PostgreSQL libpq incorrect neutralization of quoting syntax allows SQL injection - debian/patches/CVE-2025-1094.patch: Add full encoding validation in libpq data-quoting functions. - CVE-2025-1094
Updated packages:
  • libecpg-compat3_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:07f9d72bca1f6d3e2728171883f5254388df3a78
  • libecpg-dev_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:969d77fd77b59c443a9a63f110a8b9872434ca2c
  • libecpg6_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:1c3fd13ef85c23c4bebc59ec220c9dc67513a660
  • libpgtypes3_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:e5abe338b5a2b3b278c1869ff871ed7014ceb0fb
  • libpq-dev_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:d821d36e4cbf9f5cdd36eeda3674d02ef69af93d
  • libpq5_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:0c44021d6babe5a06e18e0b6813b38c779002f8d
  • postgresql-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:9bfe50b6dd5ee5aac6ed1e09bcb6fa8bc0dee968
  • postgresql-client-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:4dfb3c96a31408fee9890e77581798b1f6f76577
  • postgresql-doc-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_all.deb
    sha:cc0a3e1d7ad77fad4a218ddae1843be84be2d065
  • postgresql-plperl-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:2157c9380fd738a9ad61a59ca718feef535b010c
  • postgresql-plpython-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:0aaa1d16936a4a3d2b4a436f4a2f011be97debd3
  • postgresql-plpython3-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:e811a63ce146b010c7ec6e613db40b63c4954792
  • postgresql-pltcl-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:71c0ad6e6147ac44edc93930e7dfe781e50b60ee
  • postgresql-server-dev-10_10.23-0ubuntu0.18.04.2+tuxcare.els5_amd64.deb
    sha:ba0b3cac5353dfd02bf04fa4fd0632fcdf371e56
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.