postgresql-libs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the postgresql-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Time-of-check Time-of-use (TOCTOU)

*
  • L
Missing Authorization

*
  • H
Integer Overflow or Wraparound

<0:9.2.24-9.el7_9
  • M
Function Call With Incorrect Argument Type

*
  • L
Resource Exhaustion

*
  • L
Buffer Overflow

*
  • M
SQL Injection

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Incomplete Cleanup

<0:9.2.24-8.el7_9
  • L
Insufficiently Protected Credentials

*
  • M
SQL Injection

*
  • H
Improper Initialization

<0:9.2.24-1.el7_5
  • M
Improper Authentication

<0:9.2.23-1.el7_4
  • M
Insufficiently Protected Credentials

<0:9.2.23-1.el7_4
  • H
Integer Overflow or Wraparound

<0:9.2.15-1.el7_2
  • M
Incorrect Calculation of Buffer Size

<0:9.2.14-1.el7_1
  • M
Incorrect Calculation of Buffer Size

<0:9.2.14-1.el7_1
  • M
Information Exposure

<0:9.2.13-1.el7_1
  • M
Unchecked Error Condition

<0:9.2.13-1.el7_1
  • M
Use After Free

<0:9.2.13-1.el7_1
  • M
Improper Synchronization

<0:9.2.10-2.el7_1
  • M
Heap-based Buffer Overflow

<0:9.2.10-2.el7_1
  • M
Heap-based Buffer Overflow

<0:9.2.10-2.el7_1
  • M
Improper Synchronization

<0:9.2.10-2.el7_1
  • H
Integer Overflow or Wraparound

<0:9.2.24-7.el7_9
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:9.2.24-6.el7_9
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • M
Permissive Whitelist

*
  • M
Improper Input Validation

*
  • H
SQL Injection

<0:9.2.24-6.el7_9
  • M
Improper Input Validation

*
  • M
Missing Authorization

<0:9.2.21-1.el7
  • M
Improper Authorization

<0:9.2.21-1.el7
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Link Following

<0:9.2.23-3.el7_4
  • M
Improper Input Validation

<0:9.2.18-1.el7
  • M
Untrusted Pointer Dereference

<0:9.2.18-1.el7
  • L
Incorrect Authorization

*