{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql13":"13.18-3.55.2","postgresql13-contrib":"13.18-3.55.2","postgresql13-docs":"13.18-3.55.2","postgresql13-plperl":"13.18-3.55.2","postgresql13-plpython":"13.18-3.55.2","postgresql13-pltcl":"13.18-3.55.2","postgresql13-server":"13.18-3.55.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"postgresql13","purl":"pkg:rpm/suse/postgresql13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"13.18-3.55.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql13":"13.18-3.55.2","postgresql13-contrib":"13.18-3.55.2","postgresql13-docs":"13.18-3.55.2","postgresql13-plperl":"13.18-3.55.2","postgresql13-plpython":"13.18-3.55.2","postgresql13-pltcl":"13.18-3.55.2","postgresql13-server":"13.18-3.55.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"postgresql13","purl":"pkg:rpm/suse/postgresql13&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"13.18-3.55.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql13 fixes the following issues:\n\n- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).\n- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).\n- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).\n- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).\n","id":"SUSE-SU-2024:4114-1","modified":"2024-11-29T09:26:32Z","published":"2024-11-29T09:26:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20244114-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10976"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10977"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-10979"}],"related":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"],"summary":"Security update for postgresql13","upstream":["CVE-2024-10976","CVE-2024-10977","CVE-2024-10978","CVE-2024-10979"]}