MGASA-2024-0372

Source
https://advisories.mageia.org/MGASA-2024-0372.html
Import Source
https://advisories.mageia.org/MGASA-2024-0372.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0372
Related
Published
2024-11-27T19:59:10Z
Modified
2024-11-27T19:23:18Z
Summary
Updated postgresql15 & postgresql13 packages fix security vulnerabilities
Details

PostgreSQL row security below e.g. subqueries disregards user ID changes. (CVE-2024-10976) PostgreSQL libpq retains an error message from man-in-the-middle. (CVE-2024-10977) PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID. (CVE-2024-10978) PostgreSQL PL/Perl environment variable changes execute arbitrary code. (CVE-2024-10979)

References
Credits

Affected packages

Mageia:9 / postgresql15

Package

Name
postgresql15
Purl
pkg:rpm/mageia/postgresql15?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
15.10-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / postgresql13

Package

Name
postgresql13
Purl
pkg:rpm/mageia/postgresql13?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
13.18-1.mga9

Ecosystem specific

{
    "section": "core"
}