Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-2557

Опубликовано: 23 авг. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-2557: postgresql security update (IMPORTANT)

[9.2.24-1]

  • update to the latest 9.2 release
  • fix CVE-2018-10915

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

postgresql

9.2.24-1.el7_5

postgresql-contrib

9.2.24-1.el7_5

postgresql-devel

9.2.24-1.el7_5

postgresql-docs

9.2.24-1.el7_5

postgresql-libs

9.2.24-1.el7_5

postgresql-plperl

9.2.24-1.el7_5

postgresql-plpython

9.2.24-1.el7_5

postgresql-pltcl

9.2.24-1.el7_5

postgresql-server

9.2.24-1.el7_5

postgresql-static

9.2.24-1.el7_5

postgresql-test

9.2.24-1.el7_5

postgresql-upgrade

9.2.24-1.el7_5

Oracle Linux x86_64

postgresql

9.2.24-1.el7_5

postgresql-contrib

9.2.24-1.el7_5

postgresql-devel

9.2.24-1.el7_5

postgresql-docs

9.2.24-1.el7_5

postgresql-libs

9.2.24-1.el7_5

postgresql-plperl

9.2.24-1.el7_5

postgresql-plpython

9.2.24-1.el7_5

postgresql-pltcl

9.2.24-1.el7_5

postgresql-server

9.2.24-1.el7_5

postgresql-static

9.2.24-1.el7_5

postgresql-test

9.2.24-1.el7_5

postgresql-upgrade

9.2.24-1.el7_5

Связанные CVE

Связанные уязвимости

CVSS3: 8.5
ubuntu
почти 7 лет назад

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

CVSS3: 8.5
redhat
почти 7 лет назад

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

CVSS3: 8.5
nvd
почти 7 лет назад

A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.

CVSS3: 8.5
debian
почти 7 лет назад

A vulnerability was found in libpq, the default PostgreSQL client libr ...

suse-cvrf
больше 6 лет назад

Security update for postgresql94