Vulnerabilites related to debian - postgresql-common
Vulnerability from fkie_nvd
Published
2017-12-05 16:29
Modified
2025-04-20 01:37
Summary
The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.
Impacted products
Vendor Product Version
debian postgresql-common 1
debian postgresql-common 2
debian postgresql-common 3
debian postgresql-common 4
debian postgresql-common 5
debian postgresql-common 6
debian postgresql-common 7
debian postgresql-common 8
debian postgresql-common 9
debian postgresql-common 10
debian postgresql-common 11
debian postgresql-common 12
debian postgresql-common 13
debian postgresql-common 14
debian postgresql-common 15
debian postgresql-common 16
debian postgresql-common 17
debian postgresql-common 18
debian postgresql-common 19
debian postgresql-common 20
debian postgresql-common 21
debian postgresql-common 22
debian postgresql-common 23
debian postgresql-common 24
debian postgresql-common 25
debian postgresql-common 26
debian postgresql-common 27
debian postgresql-common 28
debian postgresql-common 29
debian postgresql-common 30
debian postgresql-common 31
debian postgresql-common 32
debian postgresql-common 33
debian postgresql-common 34
debian postgresql-common 35
debian postgresql-common 36
debian postgresql-common 37
debian postgresql-common 38
debian postgresql-common 39
debian postgresql-common 40
debian postgresql-common 41
debian postgresql-common 42
debian postgresql-common 43
debian postgresql-common 44
debian postgresql-common 45
debian postgresql-common 46
debian postgresql-common 47
debian postgresql-common 48
debian postgresql-common 49
debian postgresql-common 50
debian postgresql-common 51
debian postgresql-common 52
debian postgresql-common 53
debian postgresql-common 54
debian postgresql-common 55
debian postgresql-common 56
debian postgresql-common 57
debian postgresql-common 58
debian postgresql-common 59
debian postgresql-common 60
debian postgresql-common 61
debian postgresql-common 62
debian postgresql-common 63
debian postgresql-common 64
debian postgresql-common 65
debian postgresql-common 66
debian postgresql-common 67
debian postgresql-common 68
debian postgresql-common 69
debian postgresql-common 70
debian postgresql-common 71
debian postgresql-common 72
debian postgresql-common 73
debian postgresql-common 74
debian postgresql-common 75
debian postgresql-common 76
debian postgresql-common 77
debian postgresql-common 78
debian postgresql-common 79
debian postgresql-common 80
debian postgresql-common 81
debian postgresql-common 82
debian postgresql-common 83
debian postgresql-common 84
debian postgresql-common 85
debian postgresql-common 86
debian postgresql-common 87
debian postgresql-common 88
debian postgresql-common 89
debian postgresql-common 90
debian postgresql-common 91
debian postgresql-common 92
debian postgresql-common 93
debian postgresql-common 94
debian postgresql-common 95
debian postgresql-common 96
debian postgresql-common 97
debian postgresql-common 98
debian postgresql-common 99
debian postgresql-common 100
debian postgresql-common 101
debian postgresql-common 102
debian postgresql-common 103
debian postgresql-common 104
debian postgresql-common 105
debian postgresql-common 106
debian postgresql-common 107
debian postgresql-common 108
debian postgresql-common 109
debian postgresql-common 110
debian postgresql-common 111
debian postgresql-common 112
debian postgresql-common 113
debian postgresql-common 114
debian postgresql-common 115
debian postgresql-common 116
debian postgresql-common 117
debian postgresql-common 118
debian postgresql-common 119
debian postgresql-common 120
debian postgresql-common 121
debian postgresql-common 122
debian postgresql-common 123
debian postgresql-common 124
debian postgresql-common 125
debian postgresql-common 126
debian postgresql-common 127
debian postgresql-common 128
debian postgresql-common 129
debian postgresql-common 130
debian postgresql-common 131
debian postgresql-common 132
debian postgresql-common 133
debian debian_linux 7.0
debian postgresql-common 1
debian postgresql-common 2
debian postgresql-common 3
debian postgresql-common 4
debian postgresql-common 5
debian postgresql-common 6
debian postgresql-common 7
debian postgresql-common 8
debian postgresql-common 9
debian postgresql-common 10
debian postgresql-common 11
debian postgresql-common 12
debian postgresql-common 13
debian postgresql-common 14
debian postgresql-common 15
debian postgresql-common 16
debian postgresql-common 17
debian postgresql-common 18
debian postgresql-common 19
debian postgresql-common 20
debian postgresql-common 21
debian postgresql-common 22
debian postgresql-common 23
debian postgresql-common 24
debian postgresql-common 25
debian postgresql-common 26
debian postgresql-common 27
debian postgresql-common 28
debian postgresql-common 29
debian postgresql-common 30
debian postgresql-common 31
debian postgresql-common 32
debian postgresql-common 33
debian postgresql-common 34
debian postgresql-common 35
debian postgresql-common 36
debian postgresql-common 37
debian postgresql-common 38
debian postgresql-common 39
debian postgresql-common 40
debian postgresql-common 41
debian postgresql-common 42
debian postgresql-common 43
debian postgresql-common 44
debian postgresql-common 45
debian postgresql-common 46
debian postgresql-common 47
debian postgresql-common 48
debian postgresql-common 49
debian postgresql-common 50
debian postgresql-common 51
debian postgresql-common 52
debian postgresql-common 53
debian postgresql-common 54
debian postgresql-common 55
debian postgresql-common 56
debian postgresql-common 57
debian postgresql-common 58
debian postgresql-common 59
debian postgresql-common 60
debian postgresql-common 61
debian postgresql-common 62
debian postgresql-common 63
debian postgresql-common 64
debian postgresql-common 65
debian postgresql-common 66
debian postgresql-common 67
debian postgresql-common 68
debian postgresql-common 69
debian postgresql-common 70
debian postgresql-common 71
debian postgresql-common 72
debian postgresql-common 73
debian postgresql-common 74
debian postgresql-common 75
debian postgresql-common 76
debian postgresql-common 77
debian postgresql-common 78
debian postgresql-common 79
debian postgresql-common 80
debian postgresql-common 81
debian postgresql-common 82
debian postgresql-common 83
debian postgresql-common 84
debian postgresql-common 85
debian postgresql-common 86
debian postgresql-common 87
debian postgresql-common 88
debian postgresql-common 89
debian postgresql-common 90
debian postgresql-common 91
debian postgresql-common 92
debian postgresql-common 93
debian postgresql-common 94
debian postgresql-common 95
debian postgresql-common 96
debian postgresql-common 97
debian postgresql-common 98
debian postgresql-common 99
debian postgresql-common 100
debian postgresql-common 101
debian postgresql-common 102
debian postgresql-common 103
debian postgresql-common 104
debian postgresql-common 105
debian postgresql-common 106
debian postgresql-common 107
debian postgresql-common 108
debian postgresql-common 109
debian postgresql-common 110
debian postgresql-common 111
debian postgresql-common 112
debian postgresql-common 113
debian postgresql-common 114
debian postgresql-common 115
debian postgresql-common 116
debian postgresql-common 117
debian postgresql-common 118
debian postgresql-common 119
debian postgresql-common 120
debian postgresql-common 121
debian postgresql-common 122
debian postgresql-common 123
debian postgresql-common 124
debian postgresql-common 125
debian postgresql-common 126
debian postgresql-common 127
debian postgresql-common 128
debian postgresql-common 129
debian postgresql-common 130
debian postgresql-common 131
debian postgresql-common 132
debian postgresql-common 133
debian postgresql-common 134
debian postgresql-common 135
debian postgresql-common 136
debian postgresql-common 137
debian postgresql-common 138
debian postgresql-common 139
debian postgresql-common 140
debian postgresql-common 141
debian postgresql-common 142
debian postgresql-common 143
debian postgresql-common 144
debian postgresql-common 145
debian postgresql-common 146
debian postgresql-common 147
debian postgresql-common 148
debian postgresql-common 149
debian postgresql-common 150
debian postgresql-common 151
debian postgresql-common 152
debian postgresql-common 153
debian postgresql-common 154
debian postgresql-common 155
debian postgresql-common 156
debian postgresql-common 157
debian postgresql-common 158
debian postgresql-common 159
debian postgresql-common 160
debian postgresql-common 161
debian postgresql-common 162
debian postgresql-common 163
debian postgresql-common 164
debian debian_linux 8.0
debian postgresql-common 122
debian postgresql-common 122ubuntu1
debian postgresql-common 124
debian postgresql-common 125
debian postgresql-common 126
debian postgresql-common 127
debian postgresql-common 128
debian postgresql-common 129
debian postgresql-common 129ubuntu1
canonical ubuntu_linux 12.04
debian postgresql-common 148
debian postgresql-common 149
debian postgresql-common 150
debian postgresql-common 151
debian postgresql-common 152
debian postgresql-common 153
debian postgresql-common 153bzr1
debian postgresql-common 154
debian postgresql-common 154ubuntu1
canonical ubuntu_linux 14.04
debian postgresql-common 169git1
debian postgresql-common 170
debian postgresql-common 171
debian postgresql-common 172
debian postgresql-common 172ubuntu1
debian postgresql-common 173
canonical ubuntu_linux 16.04
debian postgresql-common 176\+git1
debian postgresql-common 177git1
debian postgresql-common 177ubuntu1
debian postgresql-common 178
debian postgresql-common 179
canonical ubuntu_linux 17.04
debian postgresql-common 179
debian postgresql-common 181
debian postgresql-common 181ubuntu1
debian postgresql-common 183
debian postgresql-common 184
debian postgresql-common 184ubuntu1
canonical ubuntu_linux 17.10



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFB76319-2B42-4595-8DBC-EFD3601089D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35333C0-D5E5-4BB7-A06B-5812383CDC6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B76C27-293B-4330-9CC5-8BFDD256AD6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:4:*:*:*:*:*:*:*",
                     matchCriteriaId: "16142296-F077-4395-BEA5-DE6368C49592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBDFF26D-DDD6-441C-BCB5-4EA3055C0BE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2626AB0F-716C-48F3-9C89-C13372D38B87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "0838CB68-4059-4555-956C-D0948A0B68C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2297D98-20C6-42DD-B24F-E4CD8FC2C083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AEC0D7D-F2F6-4E65-97BF-A8980365DB6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FF918E5-00CB-4F6D-8070-4B437E47BE15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:11:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AFD710C-D647-4A27-9235-98AF1089C59C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAD238F3-EFD1-4355-B66F-90C9C8C1FCED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:13:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D411C5-F2AF-4597-9DCC-3F847AFCF1A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D020D2-5432-4970-B4F2-70F636C21045",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "77791D73-9077-476F-B329-99868D3F14DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:16:*:*:*:*:*:*:*",
                     matchCriteriaId: "26DC26AA-422D-491B-8C9A-92A1A3EC7AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:17:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8DBA0FD-9219-4FD5-8838-92EDAC22A81A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:18:*:*:*:*:*:*:*",
                     matchCriteriaId: "56E32761-15AE-4730-B6BE-755F7DD35B3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:19:*:*:*:*:*:*:*",
                     matchCriteriaId: "E64953FA-FFA9-4B2D-8A4B-FD2A086F1048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:20:*:*:*:*:*:*:*",
                     matchCriteriaId: "366A41BF-321F-4782-9D1B-4DA8C472D862",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:21:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B040478-D37D-4AB4-A5D5-4D450E95BA16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6EA4C17-104F-4FAD-B6A8-2839703B8541",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:23:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E3247D3-E884-445D-89BC-76D251010EAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B1C23D-6912-4E9A-AA62-CD0F26AEE45A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:25:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0AA6CB5-17FF-438C-8BD9-319444B1B159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:26:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDAA572B-6AA2-49E0-A453-CFF22011EFE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:27:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0D58BE-C766-4281-8EB9-54B73C5D2B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:28:*:*:*:*:*:*:*",
                     matchCriteriaId: "54EC515F-DD99-4D57-AA1E-57217931F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:29:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1CCCD3F-FC25-4008-B989-CB683BE6BE03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABE627CF-3235-4F7A-9DB5-3E24F9C3D225",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "3329D6FB-03EC-4BFE-9E89-7E3BFCB9EA0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "B407C6FE-A7F7-47B7-BFFD-61C50C658BFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBA03CF-E9DB-49C7-A539-CAE359B78FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7252FC5-3818-4AF5-8AB4-7B3DC6519F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850F576-04B4-4CA9-8637-0EB5C344BCC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "78410C0D-5074-43AA-A943-E7AA0EBFA3FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38423F3-3A70-4097-A33E-9FE58B14B33A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EDE481D-A3C3-43FF-9800-772706050210",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:39:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2EB9915-ACAD-4767-B80D-54DE21B1CD84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:40:*:*:*:*:*:*:*",
                     matchCriteriaId: "0830F304-781F-4B01-85D2-9DC237D9AA93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:41:*:*:*:*:*:*:*",
                     matchCriteriaId: "891E0079-7BB4-4744-B307-1693C712B55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:42:*:*:*:*:*:*:*",
                     matchCriteriaId: "5788AD3A-BD54-417A-B02A-05FD4F3159A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:43:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B8EA043-AB5C-414A-939B-122E05D4550D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:44:*:*:*:*:*:*:*",
                     matchCriteriaId: "2153638E-BD53-4828-A585-A2ACBC4F1925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:45:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0327182-099A-48C1-9F1C-9D11826A9FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:46:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8A105F-A724-46E3-9B98-0BD2254E4744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:47:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AC1993-B877-4D73-BE72-2D49DEBB3258",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:48:*:*:*:*:*:*:*",
                     matchCriteriaId: "338C3208-7539-4F5B-BD03-086722149743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:49:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06A17DE-C1D9-436D-BFE3-EDA2777DC881",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:50:*:*:*:*:*:*:*",
                     matchCriteriaId: "18804DA7-EA7F-4681-98D7-22E5C7D379EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:51:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FC4DD1-FC44-43CB-AC0F-73AE043091B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:52:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A3D882D-2F3E-426B-8DC3-7A3F2085A58B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:53:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFD84E2-EBDC-4EF5-B697-6C99BEAAFCCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:54:*:*:*:*:*:*:*",
                     matchCriteriaId: "46792C75-D1EC-4CA4-B73C-28BA1A722047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:55:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3A1B70B-B0F2-460A-86FB-6717C1EE27D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:56:*:*:*:*:*:*:*",
                     matchCriteriaId: "684523D3-C07C-4BFA-892D-9F648EC00180",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:57:*:*:*:*:*:*:*",
                     matchCriteriaId: "42FDEAB2-0001-445D-AC1A-1F299BB2FE30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:58:*:*:*:*:*:*:*",
                     matchCriteriaId: "C322BD64-6EE6-4A29-BAC6-BA61E69E67AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:59:*:*:*:*:*:*:*",
                     matchCriteriaId: "3866F7DC-EFBC-44AF-A7FA-FF81D6DA0717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:60:*:*:*:*:*:*:*",
                     matchCriteriaId: "B02ED578-2B5B-4DD2-94D9-B79C44C01134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:61:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEBF536F-45CA-444F-BDB1-DB39AF2D4BC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:62:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D747338-A348-4874-837C-94D71953C7E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:63:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1EB9F51-1E98-4522-A4B3-38CE6EC599D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:64:*:*:*:*:*:*:*",
                     matchCriteriaId: "90872D82-757B-47D0-B9B3-5A9171A5A225",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:65:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E958CB-5575-4444-AA5F-8C4BF46848D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:66:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB7FF2D-9356-47CF-971C-24D9C349025E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:67:*:*:*:*:*:*:*",
                     matchCriteriaId: "0954D4D3-B1B1-4965-94B6-213BD96EB640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:68:*:*:*:*:*:*:*",
                     matchCriteriaId: "53FA6413-731A-4192-9664-5EFA11144D89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:69:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0ABD1DB-1D51-4DFA-93B2-FC41322D7BB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:70:*:*:*:*:*:*:*",
                     matchCriteriaId: "C44A842E-5BD8-4D54-88D5-C2649B1F6D0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:71:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE70338-7516-433D-AF02-E52A2C4D2DE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:72:*:*:*:*:*:*:*",
                     matchCriteriaId: "E668920B-B9D5-4A39-810A-A0099964CB32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:73:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CAEA09-376A-4846-A81D-2AE68DBC910B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:74:*:*:*:*:*:*:*",
                     matchCriteriaId: "247C9992-645B-4D58-814E-EB72FB334B3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:75:*:*:*:*:*:*:*",
                     matchCriteriaId: "8495DDEF-437B-4800-BCAE-989459E3EF60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:76:*:*:*:*:*:*:*",
                     matchCriteriaId: "C13A4D21-39FD-4EBC-BE45-35620C0B8530",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:77:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB17648B-AECD-4ED5-A053-FDF164D1A6CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:78:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBCC619D-35E1-4DF3-A4DC-45E2F034DBAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:79:*:*:*:*:*:*:*",
                     matchCriteriaId: "0628906C-A7BF-463D-A5BE-0D9292A23077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:80:*:*:*:*:*:*:*",
                     matchCriteriaId: "B834BAF7-1045-4E73-899F-3581E94CB82E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:81:*:*:*:*:*:*:*",
                     matchCriteriaId: "BED800AE-F277-40D0-903D-2701530DD9EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:82:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BC8F36-E05F-4ACD-9219-8B388D452F51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:83:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB1EC93F-97EE-4BE0-97EE-ED7E76FB4AED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:84:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD0EA5E9-5D5E-4ACD-9B5F-59F5A3E699FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:85:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F13C083-549C-4228-8D57-3BAB9540053C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:86:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE96AE19-9F00-4E18-9769-58FEE5D9990B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:87:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9C90A26-5822-495C-BD03-D99FC1BAFDC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:88:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E9C707-958D-4964-9BD2-D3C63C333ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:89:*:*:*:*:*:*:*",
                     matchCriteriaId: "F24011FB-3D6D-4C29-A5E9-9D333BAD09A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:90:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9BACE4D-D0DC-4C9D-AC55-818D1B08FEA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:91:*:*:*:*:*:*:*",
                     matchCriteriaId: "95F73833-6A51-4454-9D0C-D314738F616B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:92:*:*:*:*:*:*:*",
                     matchCriteriaId: "90AA3195-D574-4E62-953B-8F3F6A7B4B02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:93:*:*:*:*:*:*:*",
                     matchCriteriaId: "1236A7E2-0328-48D9-A93A-DB19B5FF03FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:94:*:*:*:*:*:*:*",
                     matchCriteriaId: "C010BB6E-C803-4555-8E92-2A778EE4C948",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:95:*:*:*:*:*:*:*",
                     matchCriteriaId: "6376F841-364F-4338-BA1B-08F473AF2F78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:96:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6FB7C2-AE60-48BE-81C9-47E5C228A2F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:97:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2A262D5-9D6A-49C5-BD9D-C9AA2E313E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:98:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9AA35C-B44B-4282-9F51-1FCDD7BFBF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:99:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D489864-5E28-49D8-BB64-0CD5A5BDC1CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:100:*:*:*:*:*:*:*",
                     matchCriteriaId: "E90F0932-3E2E-40FF-9B99-09CF629AFAA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "3786D50D-649F-4DA9-822B-C713442C1217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:102:*:*:*:*:*:*:*",
                     matchCriteriaId: "C89DCA41-9ED1-4750-97B6-14184CC0182D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:103:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1A2378-6E47-4493-903B-9A2B1E80366E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:104:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDEE890B-BE03-450C-9C52-BD1715A42D42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:105:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AD36B2D-F5A4-4239-9948-2E2E5B2D38AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:106:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D6CCB8-9DF4-4315-AB94-D9D1077452C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:107:*:*:*:*:*:*:*",
                     matchCriteriaId: "15ADB147-44FF-47B6-BA22-35BD5EDB9FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:108:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D72AF8-2E96-4A07-BA47-ED035C73AF3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:109:*:*:*:*:*:*:*",
                     matchCriteriaId: "78BB6C27-C72B-4FB7-861C-2B0FBC0A380B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:110:*:*:*:*:*:*:*",
                     matchCriteriaId: "4328997B-E07E-40D9-854C-E08E0A9EF866",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:111:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE0778C-2CCA-4DC0-8BF4-F2EAE4B0EAAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:112:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F396A75-1C7F-406B-914F-29A750153AA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:113:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2182AE8-4E63-49FE-8BCD-21352090E0A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:114:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20D5136-AEA0-4A95-8AF3-532500D40168",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:115:*:*:*:*:*:*:*",
                     matchCriteriaId: "B12535C5-5D46-4483-B66C-0FD205435A20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:116:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7B9F9AF-B4E7-4042-9AE2-CA42099BF315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:117:*:*:*:*:*:*:*",
                     matchCriteriaId: "1686A475-1796-459F-9F12-291D81F053EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:118:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A568075-DDC1-437D-8E0B-213550452FE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:119:*:*:*:*:*:*:*",
                     matchCriteriaId: "D00389E5-7311-4049-98DB-0FB9342D2FA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:120:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE2E6DB6-D02F-4784-84AA-D21073BF0C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:121:*:*:*:*:*:*:*",
                     matchCriteriaId: "03CCED1B-0DA0-425D-85F2-9110DB764925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:122:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2CAF870-54AD-4938-929B-6E078D6EA8C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:123:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA09059E-F18D-4854-AFE2-530B13897625",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:124:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA168F9A-ACB1-4736-B22A-BC4717742C6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:125:*:*:*:*:*:*:*",
                     matchCriteriaId: "36CDA0E1-DBFC-4F91-92E1-8221FBF3C96B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:126:*:*:*:*:*:*:*",
                     matchCriteriaId: "234885ED-A393-45C2-8AAC-AE62BEFED232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:127:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD8D2F5-A036-4727-A2A8-69A23952D650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:128:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5C7E00-7646-405E-B887-7259BCB98C88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:129:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D893894-30C3-4506-8D96-D908FD2DEC55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:130:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE6CB5A-CA5F-444B-9359-0961FB877B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:131:*:*:*:*:*:*:*",
                     matchCriteriaId: "D64850A9-D375-4194-9924-3FCD5737AC8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:132:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBC39B14-0BDE-482D-9C7E-F1A2FA1E9454",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:133:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B6D3406-4C25-4990-AEBE-ED97EF2970D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFB76319-2B42-4595-8DBC-EFD3601089D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35333C0-D5E5-4BB7-A06B-5812383CDC6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B76C27-293B-4330-9CC5-8BFDD256AD6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:4:*:*:*:*:*:*:*",
                     matchCriteriaId: "16142296-F077-4395-BEA5-DE6368C49592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:5:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBDFF26D-DDD6-441C-BCB5-4EA3055C0BE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2626AB0F-716C-48F3-9C89-C13372D38B87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "0838CB68-4059-4555-956C-D0948A0B68C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2297D98-20C6-42DD-B24F-E4CD8FC2C083",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AEC0D7D-F2F6-4E65-97BF-A8980365DB6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FF918E5-00CB-4F6D-8070-4B437E47BE15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:11:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AFD710C-D647-4A27-9235-98AF1089C59C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:12:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAD238F3-EFD1-4355-B66F-90C9C8C1FCED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:13:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D411C5-F2AF-4597-9DCC-3F847AFCF1A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D020D2-5432-4970-B4F2-70F636C21045",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "77791D73-9077-476F-B329-99868D3F14DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:16:*:*:*:*:*:*:*",
                     matchCriteriaId: "26DC26AA-422D-491B-8C9A-92A1A3EC7AB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:17:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8DBA0FD-9219-4FD5-8838-92EDAC22A81A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:18:*:*:*:*:*:*:*",
                     matchCriteriaId: "56E32761-15AE-4730-B6BE-755F7DD35B3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:19:*:*:*:*:*:*:*",
                     matchCriteriaId: "E64953FA-FFA9-4B2D-8A4B-FD2A086F1048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:20:*:*:*:*:*:*:*",
                     matchCriteriaId: "366A41BF-321F-4782-9D1B-4DA8C472D862",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:21:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B040478-D37D-4AB4-A5D5-4D450E95BA16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:22:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6EA4C17-104F-4FAD-B6A8-2839703B8541",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:23:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E3247D3-E884-445D-89BC-76D251010EAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:24:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B1C23D-6912-4E9A-AA62-CD0F26AEE45A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:25:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0AA6CB5-17FF-438C-8BD9-319444B1B159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:26:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDAA572B-6AA2-49E0-A453-CFF22011EFE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:27:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0D58BE-C766-4281-8EB9-54B73C5D2B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:28:*:*:*:*:*:*:*",
                     matchCriteriaId: "54EC515F-DD99-4D57-AA1E-57217931F4A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:29:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1CCCD3F-FC25-4008-B989-CB683BE6BE03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:30:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABE627CF-3235-4F7A-9DB5-3E24F9C3D225",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "3329D6FB-03EC-4BFE-9E89-7E3BFCB9EA0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:32:*:*:*:*:*:*:*",
                     matchCriteriaId: "B407C6FE-A7F7-47B7-BFFD-61C50C658BFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:33:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBA03CF-E9DB-49C7-A539-CAE359B78FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:34:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7252FC5-3818-4AF5-8AB4-7B3DC6519F31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:35:*:*:*:*:*:*:*",
                     matchCriteriaId: "B850F576-04B4-4CA9-8637-0EB5C344BCC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:36:*:*:*:*:*:*:*",
                     matchCriteriaId: "78410C0D-5074-43AA-A943-E7AA0EBFA3FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "C38423F3-3A70-4097-A33E-9FE58B14B33A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:38:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EDE481D-A3C3-43FF-9800-772706050210",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:39:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2EB9915-ACAD-4767-B80D-54DE21B1CD84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:40:*:*:*:*:*:*:*",
                     matchCriteriaId: "0830F304-781F-4B01-85D2-9DC237D9AA93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:41:*:*:*:*:*:*:*",
                     matchCriteriaId: "891E0079-7BB4-4744-B307-1693C712B55B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:42:*:*:*:*:*:*:*",
                     matchCriteriaId: "5788AD3A-BD54-417A-B02A-05FD4F3159A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:43:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B8EA043-AB5C-414A-939B-122E05D4550D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:44:*:*:*:*:*:*:*",
                     matchCriteriaId: "2153638E-BD53-4828-A585-A2ACBC4F1925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:45:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0327182-099A-48C1-9F1C-9D11826A9FEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:46:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E8A105F-A724-46E3-9B98-0BD2254E4744",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:47:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AC1993-B877-4D73-BE72-2D49DEBB3258",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:48:*:*:*:*:*:*:*",
                     matchCriteriaId: "338C3208-7539-4F5B-BD03-086722149743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:49:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06A17DE-C1D9-436D-BFE3-EDA2777DC881",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:50:*:*:*:*:*:*:*",
                     matchCriteriaId: "18804DA7-EA7F-4681-98D7-22E5C7D379EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:51:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FC4DD1-FC44-43CB-AC0F-73AE043091B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:52:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A3D882D-2F3E-426B-8DC3-7A3F2085A58B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:53:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFD84E2-EBDC-4EF5-B697-6C99BEAAFCCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:54:*:*:*:*:*:*:*",
                     matchCriteriaId: "46792C75-D1EC-4CA4-B73C-28BA1A722047",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:55:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3A1B70B-B0F2-460A-86FB-6717C1EE27D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:56:*:*:*:*:*:*:*",
                     matchCriteriaId: "684523D3-C07C-4BFA-892D-9F648EC00180",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:57:*:*:*:*:*:*:*",
                     matchCriteriaId: "42FDEAB2-0001-445D-AC1A-1F299BB2FE30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:58:*:*:*:*:*:*:*",
                     matchCriteriaId: "C322BD64-6EE6-4A29-BAC6-BA61E69E67AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:59:*:*:*:*:*:*:*",
                     matchCriteriaId: "3866F7DC-EFBC-44AF-A7FA-FF81D6DA0717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:60:*:*:*:*:*:*:*",
                     matchCriteriaId: "B02ED578-2B5B-4DD2-94D9-B79C44C01134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:61:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEBF536F-45CA-444F-BDB1-DB39AF2D4BC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:62:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D747338-A348-4874-837C-94D71953C7E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:63:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1EB9F51-1E98-4522-A4B3-38CE6EC599D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:64:*:*:*:*:*:*:*",
                     matchCriteriaId: "90872D82-757B-47D0-B9B3-5A9171A5A225",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:65:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E958CB-5575-4444-AA5F-8C4BF46848D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:66:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB7FF2D-9356-47CF-971C-24D9C349025E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:67:*:*:*:*:*:*:*",
                     matchCriteriaId: "0954D4D3-B1B1-4965-94B6-213BD96EB640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:68:*:*:*:*:*:*:*",
                     matchCriteriaId: "53FA6413-731A-4192-9664-5EFA11144D89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:69:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0ABD1DB-1D51-4DFA-93B2-FC41322D7BB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:70:*:*:*:*:*:*:*",
                     matchCriteriaId: "C44A842E-5BD8-4D54-88D5-C2649B1F6D0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:71:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE70338-7516-433D-AF02-E52A2C4D2DE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:72:*:*:*:*:*:*:*",
                     matchCriteriaId: "E668920B-B9D5-4A39-810A-A0099964CB32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:73:*:*:*:*:*:*:*",
                     matchCriteriaId: "26CAEA09-376A-4846-A81D-2AE68DBC910B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:74:*:*:*:*:*:*:*",
                     matchCriteriaId: "247C9992-645B-4D58-814E-EB72FB334B3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:75:*:*:*:*:*:*:*",
                     matchCriteriaId: "8495DDEF-437B-4800-BCAE-989459E3EF60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:76:*:*:*:*:*:*:*",
                     matchCriteriaId: "C13A4D21-39FD-4EBC-BE45-35620C0B8530",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:77:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB17648B-AECD-4ED5-A053-FDF164D1A6CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:78:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBCC619D-35E1-4DF3-A4DC-45E2F034DBAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:79:*:*:*:*:*:*:*",
                     matchCriteriaId: "0628906C-A7BF-463D-A5BE-0D9292A23077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:80:*:*:*:*:*:*:*",
                     matchCriteriaId: "B834BAF7-1045-4E73-899F-3581E94CB82E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:81:*:*:*:*:*:*:*",
                     matchCriteriaId: "BED800AE-F277-40D0-903D-2701530DD9EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:82:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8BC8F36-E05F-4ACD-9219-8B388D452F51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:83:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB1EC93F-97EE-4BE0-97EE-ED7E76FB4AED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:84:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD0EA5E9-5D5E-4ACD-9B5F-59F5A3E699FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:85:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F13C083-549C-4228-8D57-3BAB9540053C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:86:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE96AE19-9F00-4E18-9769-58FEE5D9990B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:87:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9C90A26-5822-495C-BD03-D99FC1BAFDC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:88:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E9C707-958D-4964-9BD2-D3C63C333ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:89:*:*:*:*:*:*:*",
                     matchCriteriaId: "F24011FB-3D6D-4C29-A5E9-9D333BAD09A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:90:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9BACE4D-D0DC-4C9D-AC55-818D1B08FEA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:91:*:*:*:*:*:*:*",
                     matchCriteriaId: "95F73833-6A51-4454-9D0C-D314738F616B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:92:*:*:*:*:*:*:*",
                     matchCriteriaId: "90AA3195-D574-4E62-953B-8F3F6A7B4B02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:93:*:*:*:*:*:*:*",
                     matchCriteriaId: "1236A7E2-0328-48D9-A93A-DB19B5FF03FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:94:*:*:*:*:*:*:*",
                     matchCriteriaId: "C010BB6E-C803-4555-8E92-2A778EE4C948",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:95:*:*:*:*:*:*:*",
                     matchCriteriaId: "6376F841-364F-4338-BA1B-08F473AF2F78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:96:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE6FB7C2-AE60-48BE-81C9-47E5C228A2F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:97:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2A262D5-9D6A-49C5-BD9D-C9AA2E313E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:98:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9AA35C-B44B-4282-9F51-1FCDD7BFBF54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:99:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D489864-5E28-49D8-BB64-0CD5A5BDC1CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:100:*:*:*:*:*:*:*",
                     matchCriteriaId: "E90F0932-3E2E-40FF-9B99-09CF629AFAA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "3786D50D-649F-4DA9-822B-C713442C1217",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:102:*:*:*:*:*:*:*",
                     matchCriteriaId: "C89DCA41-9ED1-4750-97B6-14184CC0182D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:103:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1A2378-6E47-4493-903B-9A2B1E80366E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:104:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDEE890B-BE03-450C-9C52-BD1715A42D42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:105:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AD36B2D-F5A4-4239-9948-2E2E5B2D38AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:106:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D6CCB8-9DF4-4315-AB94-D9D1077452C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:107:*:*:*:*:*:*:*",
                     matchCriteriaId: "15ADB147-44FF-47B6-BA22-35BD5EDB9FAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:108:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D72AF8-2E96-4A07-BA47-ED035C73AF3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:109:*:*:*:*:*:*:*",
                     matchCriteriaId: "78BB6C27-C72B-4FB7-861C-2B0FBC0A380B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:110:*:*:*:*:*:*:*",
                     matchCriteriaId: "4328997B-E07E-40D9-854C-E08E0A9EF866",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:111:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE0778C-2CCA-4DC0-8BF4-F2EAE4B0EAAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:112:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F396A75-1C7F-406B-914F-29A750153AA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:113:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2182AE8-4E63-49FE-8BCD-21352090E0A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:114:*:*:*:*:*:*:*",
                     matchCriteriaId: "B20D5136-AEA0-4A95-8AF3-532500D40168",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:115:*:*:*:*:*:*:*",
                     matchCriteriaId: "B12535C5-5D46-4483-B66C-0FD205435A20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:116:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7B9F9AF-B4E7-4042-9AE2-CA42099BF315",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:117:*:*:*:*:*:*:*",
                     matchCriteriaId: "1686A475-1796-459F-9F12-291D81F053EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:118:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A568075-DDC1-437D-8E0B-213550452FE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:119:*:*:*:*:*:*:*",
                     matchCriteriaId: "D00389E5-7311-4049-98DB-0FB9342D2FA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:120:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE2E6DB6-D02F-4784-84AA-D21073BF0C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:121:*:*:*:*:*:*:*",
                     matchCriteriaId: "03CCED1B-0DA0-425D-85F2-9110DB764925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:122:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2CAF870-54AD-4938-929B-6E078D6EA8C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:123:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA09059E-F18D-4854-AFE2-530B13897625",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:124:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA168F9A-ACB1-4736-B22A-BC4717742C6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:125:*:*:*:*:*:*:*",
                     matchCriteriaId: "36CDA0E1-DBFC-4F91-92E1-8221FBF3C96B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:126:*:*:*:*:*:*:*",
                     matchCriteriaId: "234885ED-A393-45C2-8AAC-AE62BEFED232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:127:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD8D2F5-A036-4727-A2A8-69A23952D650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:128:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5C7E00-7646-405E-B887-7259BCB98C88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:129:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D893894-30C3-4506-8D96-D908FD2DEC55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:130:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE6CB5A-CA5F-444B-9359-0961FB877B97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:131:*:*:*:*:*:*:*",
                     matchCriteriaId: "D64850A9-D375-4194-9924-3FCD5737AC8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:132:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBC39B14-0BDE-482D-9C7E-F1A2FA1E9454",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:133:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B6D3406-4C25-4990-AEBE-ED97EF2970D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:134:*:*:*:*:*:*:*",
                     matchCriteriaId: "910DEF83-1D7C-45A2-8876-0F5DBFC85615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:135:*:*:*:*:*:*:*",
                     matchCriteriaId: "5707CD13-B8AB-4197-9D67-A7D9C89C85E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:136:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA1A3E10-E3D4-489F-8A90-E62F74D5764D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:137:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BC1A794-301F-4C8F-8BC5-84F88161BF90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:138:*:*:*:*:*:*:*",
                     matchCriteriaId: "9655D797-411F-46E3-A1E4-BA8B5FA44539",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:139:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AE66DB4-CF85-47FD-9158-6D4F21DB4569",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:140:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FC7CCC0-8B58-4AE8-B0C0-D61D19C8D574",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:141:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC9CEF09-0CD8-4888-9372-9C460FBAF904",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:142:*:*:*:*:*:*:*",
                     matchCriteriaId: "C547DB25-83C6-45E9-9EB0-DC902AE64BFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:143:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B10F5B3-EF5E-46D9-AF27-623DC96A1DB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:144:*:*:*:*:*:*:*",
                     matchCriteriaId: "173E8582-4C82-49F7-B783-2E6B8195F11A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:145:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E9BD596-07F8-411B-B2CF-9A5611BB8A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:146:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E75754C-729B-4D5A-8ED1-896D09FE05FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:147:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E0B43E8-5DD5-4F56-8FA6-F2466DEB756A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:148:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E6362BE-ACC7-4418-BDA8-1A4EC6778D40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:149:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2260EE5-C1B7-4318-AEA8-17A79253AA08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A9A14D0-48AF-45B4-A705-2DB1C809EA2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:151:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC515370-125C-49AD-82A5-865112FAC966",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:152:*:*:*:*:*:*:*",
                     matchCriteriaId: "0012F54A-6CE9-4E61-82B3-1165B4051CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:153:*:*:*:*:*:*:*",
                     matchCriteriaId: "A737DB5A-1A61-41A4-B382-E50C35A41C10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:154:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE963AB7-D2C2-41DD-BB2C-31E8A8DC6389",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:155:*:*:*:*:*:*:*",
                     matchCriteriaId: "E07B41B3-580E-42C5-9BCD-C75680175108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:156:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06BA630-1574-4CD2-BA2B-50F9CA06B5CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:157:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D86D714-BAC3-4586-8136-A22B0F794B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:158:*:*:*:*:*:*:*",
                     matchCriteriaId: "76EF41DB-6FCA-4587-BA02-0354A0B0614A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:159:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD490B15-12B8-4BB0-B6C3-2A3C69FD0DB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:160:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B850045-3C21-4FEF-9FBE-7EEF4DD51871",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:161:*:*:*:*:*:*:*",
                     matchCriteriaId: "6093F689-C790-4CBF-BF83-5D0B4B7F7E7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:162:*:*:*:*:*:*:*",
                     matchCriteriaId: "866C0483-6082-4664-9CA4-7F4F1184BE24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:163:*:*:*:*:*:*:*",
                     matchCriteriaId: "78B1C51E-903B-4F08-9E47-EB510E9E0809",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:164:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FE34727-26F9-42D9-8269-BB69E3565C57",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:122:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2CAF870-54AD-4938-929B-6E078D6EA8C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:122ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEFDFAF5-A894-4F8A-A4A2-EC99CA031EDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:124:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA168F9A-ACB1-4736-B22A-BC4717742C6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:125:*:*:*:*:*:*:*",
                     matchCriteriaId: "36CDA0E1-DBFC-4F91-92E1-8221FBF3C96B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:126:*:*:*:*:*:*:*",
                     matchCriteriaId: "234885ED-A393-45C2-8AAC-AE62BEFED232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:127:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD8D2F5-A036-4727-A2A8-69A23952D650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:128:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5C7E00-7646-405E-B887-7259BCB98C88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:129:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D893894-30C3-4506-8D96-D908FD2DEC55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:129ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C450BA9-8B0F-46E4-AF62-EEAECA83D976",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:148:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E6362BE-ACC7-4418-BDA8-1A4EC6778D40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:149:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2260EE5-C1B7-4318-AEA8-17A79253AA08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A9A14D0-48AF-45B4-A705-2DB1C809EA2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:151:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC515370-125C-49AD-82A5-865112FAC966",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:152:*:*:*:*:*:*:*",
                     matchCriteriaId: "0012F54A-6CE9-4E61-82B3-1165B4051CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:153:*:*:*:*:*:*:*",
                     matchCriteriaId: "A737DB5A-1A61-41A4-B382-E50C35A41C10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:153bzr1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B27337ED-E996-48EC-AF6C-F9A3ECA60879",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:154:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE963AB7-D2C2-41DD-BB2C-31E8A8DC6389",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:154ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2017E90-C7D2-4765-819E-8975023A75D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:169git1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA2A676-F872-4E68-997C-E2725902F331",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:170:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB4B2D79-F866-4C0B-A1E4-731D284355DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:171:*:*:*:*:*:*:*",
                     matchCriteriaId: "D20DC0D2-6F28-449C-9FEB-EA780C4956C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:172:*:*:*:*:*:*:*",
                     matchCriteriaId: "0612D022-DC21-447E-A5D1-C059360AA987",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:172ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3FE7369-5C0E-4B4E-9681-BBFEF3C88698",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:173:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3A4567-2F84-4933-9B6E-356F6D1BCB00",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:176\\+git1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E17B7CB-1E3C-40EF-A127-C698EAD132D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:177git1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F191157A-783A-4D55-B7A3-20D5810D5A84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:177ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE217E4-6C2F-4B29-A292-10B93E754DEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:178:*:*:*:*:*:*:*",
                     matchCriteriaId: "966652D8-FAC6-48BE-ADBA-B54106AFDE69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:179:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACB9CBD2-7890-4501-A6F7-F3E9231A7BC6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "588D4F37-0A56-47A4-B710-4D5F3D214FB9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:179:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACB9CBD2-7890-4501-A6F7-F3E9231A7BC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:181:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A559ECB-F3DE-471D-84AA-C2879728706E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:181ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "21B5DFC7-1A7A-4E7D-9304-F8F07B339B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:183:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B06589F-8BAB-42E2-A397-809F8FAEB4C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:184:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D1150CF-2FDB-486D-83E3-E6EC8026D808",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:debian:postgresql-common:184ubuntu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "94B236E1-C91A-4796-A51D-E9B90D69F90D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9070C9D8-A14A-467F-8253-33B966C16886",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.",
      },
      {
         lang: "es",
         value: "El script pg_ctlcluster en el paquete postgresql-common en Debian wheezy en versiones anteriores a la 134wheezy5; Debian jessie en versiones anteriores a la 165+deb8u2; Debian inestable en versiones anteriores a la 178; Ubuntu 12.04 LTS en versiones anteriores a la 129ubuntu1.2; Ubuntu 14.04 LTS en versiones anteriores a la 154ubuntu1.1; Ubuntu 16.04 LTS en versiones anteriores a la 173ubuntu0.1; Ubuntu 17.04 en versiones anteriores a la 179ubuntu0.1 y en Ubuntu 17.10 en versiones anteriores a la 184ubuntu1.1 permite que usuarios locales obtengan privilegios root mediante un ataque de enlace simbólico en un archivo de registro en /var/log/postgresql.",
      },
   ],
   id: "CVE-2016-1255",
   lastModified: "2025-04-20T01:37:25.860",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-12-05T16:29:00.373",
   references: [
      {
         source: "security@debian.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3476-1",
      },
      {
         source: "security@debian.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3476-2",
      },
      {
         source: "security@debian.org",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
      },
      {
         source: "security@debian.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3476-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-3476-2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html",
      },
   ],
   sourceIdentifier: "security@debian.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2016-1255
Vulnerability from cvelistv5
Published
2017-12-05 16:00
Modified
2024-08-05 22:48
Severity ?
Summary
The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T22:48:13.668Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[debian-lts-announce] 20170101 [SECURITY] [DLA-774-1] postgresql-common security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html",
               },
               {
                  name: "USN-3476-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3476-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
               },
               {
                  name: "USN-3476-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-3476-2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-12-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-12-05T15:57:01",
            orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
            shortName: "debian",
         },
         references: [
            {
               name: "[debian-lts-announce] 20170101 [SECURITY] [DLA-774-1] postgresql-common security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html",
            },
            {
               name: "USN-3476-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3476-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
            },
            {
               name: "USN-3476-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-3476-2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@debian.org",
               ID: "CVE-2016-1255",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "[debian-lts-announce] 20170101 [SECURITY] [DLA-774-1] postgresql-common security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2017/01/msg00002.html",
                  },
                  {
                     name: "USN-3476-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3476-1",
                  },
                  {
                     name: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
                     refsource: "CONFIRM",
                     url: "https://anonscm.debian.org/cgit/pkg-postgresql/postgresql-common.git/commit/?id=c8989206ec360f199400c74f129f7b4cb878c1ee",
                  },
                  {
                     name: "USN-3476-2",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-3476-2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5",
      assignerShortName: "debian",
      cveId: "CVE-2016-1255",
      datePublished: "2017-12-05T16:00:00",
      dateReserved: "2015-12-27T00:00:00",
      dateUpdated: "2024-08-05T22:48:13.668Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}