{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql14":"14.15-150600.16.9.1","postgresql14-contrib":"14.15-150600.16.9.1","postgresql14-devel":"14.15-150600.16.9.1","postgresql14-docs":"14.15-150600.16.9.1","postgresql14-plperl":"14.15-150600.16.9.1","postgresql14-plpython":"14.15-150600.16.9.1","postgresql14-pltcl":"14.15-150600.16.9.1","postgresql14-server":"14.15-150600.16.9.1","postgresql14-server-devel":"14.15-150600.16.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP6","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.15-150600.16.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14-llvmjit":"14.15-150600.16.9.1","postgresql14-test":"14.15-150600.16.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP6","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.15-150600.16.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14":"14.15-150600.16.9.1","postgresql14-contrib":"14.15-150600.16.9.1","postgresql14-devel":"14.15-150600.16.9.1","postgresql14-docs":"14.15-150600.16.9.1","postgresql14-llvmjit":"14.15-150600.16.9.1","postgresql14-llvmjit-devel":"14.15-150600.16.9.1","postgresql14-plperl":"14.15-150600.16.9.1","postgresql14-plpython":"14.15-150600.16.9.1","postgresql14-pltcl":"14.15-150600.16.9.1","postgresql14-server":"14.15-150600.16.9.1","postgresql14-server-devel":"14.15-150600.16.9.1","postgresql14-test":"14.15-150600.16.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"postgresql14","purl":"pkg:rpm/opensuse/postgresql14&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.15-150600.16.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql14 fixes the following issues:\n\n- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).\n- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).\n- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).\n- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).\n","id":"SUSE-SU-2024:4118-1","modified":"2024-11-29T16:23:57Z","published":"2024-11-29T16:23:57Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244118-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10979"}],"related":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"],"summary":"Security update for postgresql14","upstream":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"]}