{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql12":"12.22-3.63.1","postgresql12-contrib":"12.22-3.63.1","postgresql12-docs":"12.22-3.63.1","postgresql12-plperl":"12.22-3.63.1","postgresql12-plpython":"12.22-3.63.1","postgresql12-pltcl":"12.22-3.63.1","postgresql12-server":"12.22-3.63.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"postgresql12","purl":"pkg:rpm/suse/postgresql12&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22-3.63.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql12":"12.22-3.63.1","postgresql12-contrib":"12.22-3.63.1","postgresql12-docs":"12.22-3.63.1","postgresql12-plperl":"12.22-3.63.1","postgresql12-plpython":"12.22-3.63.1","postgresql12-pltcl":"12.22-3.63.1","postgresql12-server":"12.22-3.63.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"postgresql12","purl":"pkg:rpm/suse/postgresql12&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22-3.63.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql12 fixes the following issues:\n\n- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).\n- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).\n- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).\n- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).\n","id":"SUSE-SU-2024:4097-1","modified":"2024-11-28T12:24:18Z","published":"2024-11-28T12:24:18Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244097-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10979"}],"related":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"],"summary":"Security update for postgresql12","upstream":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"]}