git: f3fe33710cee - main - security/vuxml: Add CVEs for PostreSQL

From: Palle Girgensohn <girgen_at_FreeBSD.org>
Date: Thu, 14 Nov 2024 16:31:38 UTC
The branch main has been updated by girgen:

URL: https://cgit.FreeBSD.org/ports/commit/?id=f3fe33710cee7d5ae2b852096b64f803d1d39e2d

commit f3fe33710cee7d5ae2b852096b64f803d1d39e2d
Author:     Palle Girgensohn <girgen@FreeBSD.org>
AuthorDate: 2024-11-14 15:53:16 +0000
Commit:     Palle Girgensohn <girgen@FreeBSD.org>
CommitDate: 2024-11-14 16:29:07 +0000

    security/vuxml: Add CVEs for PostreSQL
---
 security/vuxml/vuln/2024.xml | 241 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 241 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 26d525fd8766..47c386c1d48d 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,244 @@
+  <vuln vid="a03636f4-a29f-11ef-af48-6cc21735f730">
+    <topic>PostgreSQL -- PL/Perl environment variable changes execute arbitrary code</topic>
+    <affects>
+      <package>
+	<name>postgresql17-plperl</name>
+	<range><lt>17.1</lt></range>
+      </package>
+      <package>
+	<name>postgresql16-plperl</name>
+	<range><lt>16.5</lt></range>
+      </package>
+      <package>
+	<name>postgresql15-plperl</name>
+	<range><lt>15.9</lt></range>
+      </package>
+      <package>
+	<name>postgresql14-plperl</name>
+	<range><lt>14.14</lt></range>
+      </package>
+      <package>
+	<name>postgresql13-plperl</name>
+	<range><lt>13.17</lt></range>
+      </package>
+      <package>
+	<name>postgresql12-plperl</name>
+	<range><lt>12.21</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2024-10979/">
+	<p>
+	Incorrect control of environment variables in PostgreSQL
+	PL/Perl allows an unprivileged database user to change
+	sensitive process environment variables (e.g. PATH).
+	That often suffices to enable arbitrary code execution,
+	even if the attacker lacks a database server operating
+	system user.
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-10979</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2024-10979/</url>
+    </references>
+    <dates>
+      <discovery>2024-11-14</discovery>
+      <entry>2024-11-14</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="12e3feab-a29f-11ef-af48-6cc21735f730">
+    <topic>PostgreSQL -- SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID</topic>
+    <affects>
+      <package>
+	<name>postgresql17-server</name>
+	<range><lt>17.1</lt></range>
+      </package>
+      <package>
+	<name>postgresql16-server</name>
+	<range><lt>16.5</lt></range>
+      </package>
+      <package>
+	<name>postgresql15-server</name>
+	<range><lt>15.9</lt></range>
+      </package>
+      <package>
+	<name>postgresql14-server</name>
+	<range><lt>14.14</lt></range>
+      </package>
+      <package>
+	<name>postgresql13-server</name>
+	<range><lt>13.17</lt></range>
+      </package>
+      <package>
+	<name>postgresql12-server</name>
+	<range><lt>12.21</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2024-10978/">
+	<p>
+	Incorrect privilege assignment in PostgreSQL allows a
+	less-privileged application user to view or change
+	different rows from those intended. An attack requires
+	the application to use SET ROLE, SET SESSION
+	AUTHORIZATION, or an equivalent feature. The problem
+	arises when an application query uses parameters from
+	the attacker or conveys query results to the attacker.
+	If that query reacts to current_setting('role') or the
+	current user ID, it may modify or return data as though
+	the session had not used SET ROLE or SET SESSION
+	AUTHORIZATION. The attacker does not control which
+	incorrect user ID applies. Query text from
+	less-privileged sources is not a concern here, because
+	SET ROLE and SET SESSION AUTHORIZATION are not sandboxes
+	for unvetted queries
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-10978</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2024-10978/</url>
+    </references>
+    <dates>
+      <discovery>2024-11-14</discovery>
+      <entry>2024-11-14</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="a61ef21b-a29e-11ef-af48-6cc21735f730">
+    <topic>PostgreSQL -- libpq retains an error message from man-in-the-middle</topic>
+    <affects>
+      <package>
+	<name>postgresql17-client</name>
+	<range><lt>17.1</lt></range>
+      </package>
+      <package>
+	<name>postgresql16-client</name>
+	<range><lt>16.5</lt></range>
+      </package>
+      <package>
+	<name>postgresql15-client</name>
+	<range><lt>15.9</lt></range>
+      </package>
+      <package>
+	<name>postgresql14-client</name>
+	<range><lt>14.14</lt></range>
+      </package>
+      <package>
+	<name>postgresql13-client</name>
+	<range><lt>13.17</lt></range>
+      </package>
+      <package>
+	<name>postgresql12-client</name>
+	<range><lt>12.21</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2024-10977/">
+	<p>
+	Client use of server error message in PostgreSQL allows
+	a server not trusted under current SSL or GSS settings
+	to furnish arbitrary non-NUL bytes to the libpq
+	application. For example, a man-in-the-middle attacker
+	could send a long error message that a human or
+	screen-scraper user of psql mistakes for valid query
+	results. This is probably not a concern for clients
+	where the user interface unambiguously indicates the
+	boundary between one error message and other text.
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-10977</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2024-10977/</url>
+    </references>
+    <dates>
+      <discovery>2024-11-14</discovery>
+      <entry>2024-11-14</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="3831292b-a29d-11ef-af48-6cc21735f730">
+    <topic>PostgreSQL -- PostgreSQL row security below e.g. subqueries disregards user ID changes</topic>
+    <affects>
+      <package>
+	<name>postgresql17-server</name>
+	<range><lt>17.1</lt></range>
+      </package>
+      <package>
+	<name>postgresql16-server</name>
+	<range><lt>16.5</lt></range>
+      </package>
+      <package>
+	<name>postgresql15-server</name>
+	<range><lt>15.9</lt></range>
+      </package>
+      <package>
+	<name>postgresql14-server</name>
+	<range><lt>14.14</lt></range>
+      </package>
+      <package>
+	<name>postgresql13-server</name>
+	<range><lt>13.17</lt></range>
+      </package>
+      <package>
+	<name>postgresql12-server</name>
+	<range><lt>12.21</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>PostgreSQL project reports:</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2024-10976/">
+	<p>
+	Incomplete tracking in PostgreSQL of tables with row
+	security allows a reused query to view or change
+	different rows from those intended. CVE-2023-2455 and
+	CVE-2016-2193 fixed most interaction between row
+	security and user ID changes. They missed cases where a
+	subquery, WITH query, security invoker view, or
+	SQL-language function references a table with a
+	row-level security policy. This has the same
+	consequences as the two earlier CVEs. That is to say, it
+	leads to potentially incorrect policies being applied in
+	cases where role-specific policies are used and a given
+	query is planned under one role and then executed under
+	other roles. This scenario can happen under security
+	definer functions or when a common user and query is
+	planned initially and then re-used across multiple SET
+	ROLEs.
+
+	Applying an incorrect policy may permit a user to complete
+	otherwise-forbidden reads and modifications. This affects only databases
+	that have used CREATE POLICY to define a row security policy. An
+	attacker must tailor an attack to a particular application's pattern of
+	query plan reuse, user ID changes, and role-specific row security
+	policies.
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-10976</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2024-10976/</url>
+    </references>
+    <dates>
+      <discovery>2024-11-14</discovery>
+      <entry>2024-11-14</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="6b591e05-971c-4077-8ae4-1310554971b7">
     <topic>electron31 -- multiple vulnerabilities</topic>
     <affects>