-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.2071
                        postgresql security update
                               10 June 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           postgresql:9.6
                   postgresql:10
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-32028 CVE-2021-32027 

Reference:         ESB-2021.1843
                   ESB-2021.1658

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:2360
   https://access.redhat.com/errata/RHSA-2021:2361

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: postgresql:9.6 security update
Advisory ID:       RHSA-2021:2360-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2360
Issue date:        2021-06-09
CVE Names:         CVE-2021-32027 CVE-2021-32028 
=====================================================================

1. Summary:

An update for the postgresql:9.6 module is now available for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
postgresql (9.6.22)

Security Fix(es):

* postgresql: Buffer overrun from integer overflow in array subscripting
calculations (CVE-2021-32027)

* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
(CVE-2021-32028)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

5. Bugs fixed (https://bugzilla.redhat.com/):

1956876 - CVE-2021-32027 postgresql: Buffer overrun from integer overflow in array subscripting calculations
1956877 - CVE-2021-32028 postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e.src.rpm

aarch64:
postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-contrib-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-contrib-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-debugsource-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-docs-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-docs-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-plperl-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-plperl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-plpython3-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-plpython3-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-pltcl-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-pltcl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-server-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-server-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-server-devel-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-server-devel-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-static-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-test-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-test-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm
postgresql-test-rpm-macros-9.6.22-1.module+el8.4.0+11244+beebcf7e.aarch64.rpm

ppc64le:
postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-contrib-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-contrib-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-debugsource-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-docs-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-docs-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-plperl-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-plperl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-plpython3-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-plpython3-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-pltcl-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-pltcl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-server-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-server-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-server-devel-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-server-devel-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-static-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-test-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-test-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm
postgresql-test-rpm-macros-9.6.22-1.module+el8.4.0+11244+beebcf7e.ppc64le.rpm

s390x:
postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-contrib-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-contrib-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-debugsource-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-docs-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-docs-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-plperl-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-plperl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-plpython3-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-plpython3-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-pltcl-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-pltcl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-server-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-server-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-server-devel-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-server-devel-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-static-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-test-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-test-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm
postgresql-test-rpm-macros-9.6.22-1.module+el8.4.0+11244+beebcf7e.s390x.rpm

x86_64:
postgresql-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-contrib-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-contrib-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-debugsource-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-docs-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-docs-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-plperl-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-plperl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-plpython3-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-plpython3-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-pltcl-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-pltcl-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-server-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-server-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-server-devel-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-server-devel-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-static-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-test-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-test-debuginfo-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm
postgresql-test-rpm-macros-9.6.22-1.module+el8.4.0+11244+beebcf7e.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-32027
https://access.redhat.com/security/cve/CVE-2021-32028
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=gIEz
- -----END PGP SIGNATURE-----

- ----------------------------------------------------------------------------------------------------------------------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: postgresql:10 security update
Advisory ID:       RHSA-2021:2361-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2361
Issue date:        2021-06-09
CVE Names:         CVE-2021-32027 CVE-2021-32028 
=====================================================================

1. Summary:

An update for the postgresql:10 module is now available for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

PostgreSQL is an advanced object-relational database management system
(DBMS).

The following packages have been upgraded to a later upstream version:
postgresql (10.17).

Security Fix(es):

* postgresql: Buffer overrun from integer overflow in array subscripting
calculations (CVE-2021-32027)

* postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE
(CVE-2021-32028)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

If the postgresql service is running, it will be automatically restarted
after installing this update.

5. Bugs fixed (https://bugzilla.redhat.com/):

1956876 - CVE-2021-32027 postgresql: Buffer overrun from integer overflow in array subscripting calculations
1956877 - CVE-2021-32028 postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
postgresql-10.17-1.module+el8.4.0+11249+895597ab.src.rpm

aarch64:
postgresql-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-contrib-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-contrib-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-debugsource-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-docs-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-docs-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-plperl-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-plperl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-plpython3-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-plpython3-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-pltcl-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-pltcl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-server-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-server-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-server-devel-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-server-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-static-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-test-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-test-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-test-rpm-macros-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-upgrade-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-upgrade-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-upgrade-devel-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm
postgresql-upgrade-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.aarch64.rpm

ppc64le:
postgresql-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-contrib-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-contrib-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-debugsource-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-docs-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-docs-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-plperl-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-plperl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-plpython3-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-plpython3-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-pltcl-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-pltcl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-server-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-server-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-server-devel-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-server-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-static-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-test-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-test-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-test-rpm-macros-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-upgrade-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-upgrade-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-upgrade-devel-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm
postgresql-upgrade-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.ppc64le.rpm

s390x:
postgresql-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-contrib-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-contrib-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-debugsource-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-docs-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-docs-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-plperl-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-plperl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-plpython3-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-plpython3-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-pltcl-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-pltcl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-server-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-server-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-server-devel-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-server-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-static-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-test-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-test-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-test-rpm-macros-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-upgrade-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-upgrade-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-upgrade-devel-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm
postgresql-upgrade-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.s390x.rpm

x86_64:
postgresql-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-contrib-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-contrib-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-debugsource-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-docs-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-docs-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-plperl-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-plperl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-plpython3-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-plpython3-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-pltcl-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-pltcl-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-server-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-server-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-server-devel-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-server-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-static-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-test-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-test-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-test-rpm-macros-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-upgrade-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-upgrade-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-upgrade-devel-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm
postgresql-upgrade-devel-debuginfo-10.17-1.module+el8.4.0+11249+895597ab.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-32027
https://access.redhat.com/security/cve/CVE-2021-32028
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9k5W
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYMFyv+NLKJtyKPYoAQj1Cw//b1ul8wliLp9+toqxGpaAqOa+BOV1OiNX
eJ9qiHifab2HWcxe8TZCD3/5oacamGk1WT2g0wOaiJnaPKPn+IEFcVGrLoERZGEy
+xQqx3Yxt41QJB4uFUty5vinfxoOk72dySf9YxziAhOWkrE7oIKliw3hHc2tBfbA
wrtiXifKy4O6QDtNTpb9bBy6H/VhAnBLx5gV/a2tfXvR1i2/cCixzJRZG1TJuS0j
D1xkA7lFSuCx4MulK627mt7mIJD10Sj0IPjJxDvz9kL/VLaA9rsfnoe7n+m6Mfuk
VJL0eNwyQdNT967wXwAMJHBM1EqMIcoCwvmOJvawlrWt8iAT130Uc8pOJz+PvKpp
zyumjkIUHwd8XhvG2CzWbY5tyEQf0+6FKIYaLwp0Jqno7hsIHrjixuAZA0zuMsix
myUXpAM2+J5qrRBU6CSL5vAMGyYT6BEMOuFKsw1gb0i8VnDQjMY/VmVPcleJRG5p
kHApna3yWaVB5IXlVDA7B7Su+2zdmJrRb901HYUxvmPjHNdR2cV7V9ms+B3GjSMz
EMIkNK2FiNr5Gw+AEsUES6yj+21Nc4ZHAjjeUQLaGf8hzLuJHJCDIH3tzJ7ysDi0
+JznAHiCesljXgNnxFfAJKLOfCs0FjRSl8MxKy9tUy/+CmefjJoMRydVpxH7Uew1
Mr72550i2OY=
=8Ro5
-----END PGP SIGNATURE-----