{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Fix CVE-2025-1094: Improper neutralization of quoting syntax in libpq\n  escape functions allowing SQL injection.\n- Fix CVE-2024-7348: TOCTOU race condition in pg_dump allows arbitrary SQL\n  function execution via view/foreign table replacement.\n- Fix CVE-2024-10979: Block environment variable mutations from trusted\n  PL/Perl to prevent arbitrary code execution by unprivileged users.\n- Fix CVE-2025-8714: Restrict psql meta-commands in plain-text dumps to\n  prevent restore-time code injection.",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/rhel7els/advisories/2026/clsa-2026_1774460378.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-25T17:40:45Z",
      "generator": {
        "date": "2026-03-25T17:40:45Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1774460378",
      "initial_release_date": "2026-03-25T17:40:45Z",
      "revision_history": [
        {
          "date": "2026-03-25T17:40:45Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "postgresql11: Fix of 4 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Enterprise Linux 7",
                  "product_id": "Red-Hat-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-upgrade@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-test@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-pltcl@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-plpython@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-plperl@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-upgrade-devel@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-server-devel@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-devel@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-libs@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-static@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-server@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-docs@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
                "product": {
                  "name": "postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_id": "postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-contrib@11.22-1.el7.tuxcare.els2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
                "product": {
                  "name": "postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
                  "product_id": "postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/postgresql11-test-rpm-macros@11.22-1.el7.tuxcare.els2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch"
        },
        "product_reference": "postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
        "relates_to_product_reference": "Red-Hat-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64 as a component of Red Hat Enterprise Linux 7",
          "product_id": "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64"
        },
        "product_reference": "postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
        "relates_to_product_reference": "Red-Hat-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-10979",
      "cwe": {
        "id": "CWE-15",
        "name": "External Control of System or Configuration Setting"
      },
      "notes": [
        {
          "category": "description",
          "text": "Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH).  That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
          "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-10979"
        },
        {
          "category": "external",
          "summary": "https://www.postgresql.org/support/security/CVE-2024-10979/",
          "url": "https://www.postgresql.org/support/security/CVE-2024-10979/"
        },
        {
          "category": "external",
          "summary": "https://github.com/fmora50591/postgresql-env-vuln/blob/main/README.md",
          "url": "https://github.com/fmora50591/postgresql-env-vuln/blob/main/README.md"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/11/msg00011.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00011.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20250110-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20250110-0003/"
        }
      ],
      "release_date": "2024-11-14T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-25T17:39:41.613005Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378",
          "product_ids": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-8714",
      "cwe": {
        "id": "CWE-829",
        "name": "Inclusion of Functionality from Untrusted Control Sphere"
      },
      "notes": [
        {
          "category": "description",
          "text": "Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands.  pg_dumpall is also affected.  pg_restore is affected when used to generate a plain-format dump.  This is similar to MySQL CVE-2024-21096.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
          "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8714"
        }
      ],
      "release_date": "2025-08-14T13:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-25T17:39:41.613005Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378",
          "product_ids": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-7348",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "description",
          "text": "Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
          "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-7348"
        },
        {
          "category": "external",
          "summary": "https://www.postgresql.org/support/security/CVE-2024-7348/",
          "url": "https://www.postgresql.org/support/security/CVE-2024-7348/"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2024/08/11/1",
          "url": "http://www.openwall.com/lists/oss-security/2024/08/11/1"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240822-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20240822-0002/"
        }
      ],
      "release_date": "2024-08-08T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-25T17:39:41.613005Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378",
          "product_ids": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-1094",
      "cwe": {
        "id": "CWE-149",
        "name": "Improper Neutralization of Quoting Syntax"
      },
      "notes": [
        {
          "category": "description",
          "text": "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
          "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
          "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-1094"
        }
      ],
      "release_date": "2025-02-13T13:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-25T17:39:41.613005Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378",
          "product_ids": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1774460378"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Red-Hat-7:postgresql11-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-contrib-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-docs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-libs-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plperl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-plpython-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-pltcl-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-server-devel-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-static-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-test-rpm-macros-0:11.22-1.el7.tuxcare.els2.noarch",
            "Red-Hat-7:postgresql11-upgrade-0:11.22-1.el7.tuxcare.els2.x86_64",
            "Red-Hat-7:postgresql11-upgrade-devel-0:11.22-1.el7.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}