Search for packages
Package details: pkg:alpm/archlinux/postgresql-old-upgrade@9.6.5-1
purl pkg:alpm/archlinux/postgresql-old-upgrade@9.6.5-1
Next non-vulnerable version 9.6.6-1
Latest non-vulnerable version 9.6.6-1
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-4tv8-ga3v-aaar
Aliases:
CVE-2017-12172
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
9.6.6-1
Affected by 0 other vulnerabilities.
VCID-6sdf-4fh4-aaah
Aliases:
CVE-2017-15098
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
9.6.6-1
Affected by 0 other vulnerabilities.
VCID-adu8-5csv-aaaf
Aliases:
CVE-2017-15099
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
9.6.6-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:46:56.695782+00:00 Arch Linux Importer Affected by VCID-6sdf-4fh4-aaah https://security.archlinux.org/AVG-486 36.0.0
2025-03-28T07:46:56.674966+00:00 Arch Linux Importer Affected by VCID-adu8-5csv-aaaf https://security.archlinux.org/AVG-486 36.0.0
2025-03-28T07:46:08.944408+00:00 Arch Linux Importer Affected by VCID-4tv8-ga3v-aaar https://security.archlinux.org/AVG-488 36.0.0
2024-12-17T23:22:01.314404+00:00 Arch Linux Importer Affected by VCID-6sdf-4fh4-aaah https://security.archlinux.org/AVG-486 35.0.0
2024-12-17T23:22:00.868473+00:00 Arch Linux Importer Affected by VCID-adu8-5csv-aaaf https://security.archlinux.org/AVG-486 35.0.0
2024-09-18T02:02:17.954689+00:00 Arch Linux Importer Affected by VCID-6sdf-4fh4-aaah https://security.archlinux.org/AVG-486 34.0.1
2024-09-18T02:02:17.929338+00:00 Arch Linux Importer Affected by VCID-adu8-5csv-aaaf https://security.archlinux.org/AVG-486 34.0.1
2024-09-18T02:01:17.908280+00:00 Arch Linux Importer Affected by VCID-4tv8-ga3v-aaar https://security.archlinux.org/AVG-488 34.0.1
2024-04-23T19:47:34.946420+00:00 Arch Linux Importer Affected by VCID-6sdf-4fh4-aaah https://security.archlinux.org/AVG-486 34.0.0rc4
2024-04-23T19:47:34.923848+00:00 Arch Linux Importer Affected by VCID-adu8-5csv-aaaf https://security.archlinux.org/AVG-486 34.0.0rc4
2024-01-03T22:28:19.814911+00:00 Arch Linux Importer Affected by VCID-6sdf-4fh4-aaah https://security.archlinux.org/AVG-486 34.0.0rc1
2024-01-03T22:28:19.785967+00:00 Arch Linux Importer Affected by VCID-adu8-5csv-aaaf https://security.archlinux.org/AVG-486 34.0.0rc1
2024-01-03T22:27:29.033467+00:00 Arch Linux Importer Affected by VCID-4tv8-ga3v-aaar https://security.archlinux.org/AVG-488 34.0.0rc1