ELA-1302-1 postgresql-11 security update

multiple vulnerabilities

2025-01-25
Packagepostgresql-11
Version11.22-0+deb10u4 (buster)
Related CVEs CVE-2024-10976 CVE-2024-10977 CVE-2024-10978 CVE-2024-10979


Multiple security issues were discovered in PostgreSQL, which may result in the execution of arbitrary code, privilege escalation, or log manipulation.

CVE-2024-10976

Incomplete tracking in PostgreSQL of tables with row security allows a
reused query to view or change different rows from those intended. It
leads to potentially incorrect policies being applied in cases where
role-specific policies are used and a given query is planned under one
role and then executed under other roles.

CVE-2024-10977

Client use of server error message in PostgreSQL allows a server not
trusted under current SSL or GSS settings to furnish arbitrary non-NUL
bytes to the libpq application. For example, a man-in-the-middle attacker
could send a long error message that a human or screen-scraper user of
psql mistakes for valid query results. 

CVE-2024-10978

Incorrect privilege assignment in PostgreSQL allows a less-privileged
application user to view or change different rows from those intended. An
attack requires the application to use SET ROLE, SET SESSION
AUTHORIZATION, or an equivalent feature.

CVE-2024-10979

Incorrect control of environment variables in PostgreSQL PL/Perl allows
an unprivileged database user to change sensitive process environment
variables (e.g. PATH).


For Debian 10 buster, these problems have been fixed in version 11.22-0+deb10u4.

We recommend that you upgrade your postgresql-11 packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.