Описание
ELSA-2022-1830: postgresql:10 security update (MODERATE)
[10.19-2]
- Add missing files into file section of server package postgresql-setup v8.6 newly provides postgresql-upgrade
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module postgresql:10 is enabled
postgresql
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-contrib
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-docs
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-plperl
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-plpython3
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-pltcl
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-server
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-server-devel
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-static
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-test
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-test-rpm-macros
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-upgrade
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-upgrade-devel
10.19-1.module+el8.6.0+20530+78853f5a
Oracle Linux x86_64
Module postgresql:10 is enabled
postgresql
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-contrib
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-docs
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-plperl
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-plpython3
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-pltcl
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-server
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-server-devel
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-static
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-test
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-test-rpm-macros
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-upgrade
10.19-1.module+el8.6.0+20530+78853f5a
postgresql-upgrade-devel
10.19-1.module+el8.6.0+20530+78853f5a
Связанные CVE
Связанные уязвимости
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
When the server is configured to use trust authentication with a clien ...