From nobody Thu Nov 14 16:31:38 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xq5JV5bLWz5csXl; Thu, 14 Nov 2024 16:31:38 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xq5JV4n59z4sZq; Thu, 14 Nov 2024 16:31:38 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731601898; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=HtzRDckKKSTsckHNLIAltIPoffnvqielL2gKnr7+OC0=; b=I4Xzti6MlLIsDHNJw8i/D5NAmZ1aEmbIoa7p4hLFVyuKoEg4il11PZOXdnto3mxThmuilm iRudhMOSdRgBvGL2NJYSgW5Fw+4ewfONVaZz1LX8bA81s0diy2ArjpUK/RSWjRErFR+gPt 70FJegodwHOxRNFZy+Q4xOwD0AR1MHd8xhf5ZPVK2dAhBsvXd5Gsoxr/+0w+5+hFT+O3+t Vkq+jb7cTRdTC/rJLbQys1eZF4G/0wzB3VJ/jgkM8XNUmnHvKKJoaiv2QGJ1CpOjZsFfhM f81rDHzOpCiPM7DEHwsNuOPeg+N+o5FVXWo9BGVsw91WRs2FnuLrEVdoC6zohQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731601898; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=HtzRDckKKSTsckHNLIAltIPoffnvqielL2gKnr7+OC0=; b=Cnb2LaHX1S7R+rucQ78CEkc96Y6wDgmOPBdV/faOBPeSlZ1PKtFl1m9UEdI3nmCCb8eOgO LWkMCr7laF5pgE02rhT+UJKzMjdPI5qYoefbVEryUrHsKdblTAJm/DKPhlQqMFU66SlSO8 4nL0Zb2JvREbacD6FGliy8vwJeUTOhRC9BF4rLJg7/kWzgFir2d8PoGYIj68tpIekDZGO2 v6GFy0NHreEzVCzSpuo25+wX0H9zXQIw9gKd/9e1RqjZzfrmATF0+3Z0bx1j+Jv9MO9xg1 5ZeedFOu4lBqpzM5Zvhg78BzbV/nC57J41wEotn8RA9ptJRohC5wfWYc02jCfg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1731601898; a=rsa-sha256; cv=none; b=Oq+pA743BFu3qfbhyUOYN4dYjmW0W196QRLyfmxCs0ie0pYgYnEq8uxERaibqv4tnkp/PZ DiWXTYkMNWbavNX7WlAYqZuBBJ0epHBhgumIbd/Efehemt6dsLuR/7iQ9KRsmG8yO21Pa0 1ysSXP+cUhmG8fTytFjZIfdrkpbp/njHfwcv8ztzNNqccWEi9QR7yqLxkq5YIIkrZWLVIW lhxEni20g27Yq2SiV8zMk585BqJSXzRNEsB4qHcCdhXrdzoSQegQvOJcmPD+39Mt3mmCTz 0E5Lz6wFJUXwx3erqWmC7SaL3exhQIV3HGxEPY3MARF7XgzsGd3ySWeYLhF8yQ== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Xq5JV4NRKzmKG; Thu, 14 Nov 2024 16:31:38 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 4AEGVcsg091097; Thu, 14 Nov 2024 16:31:38 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 4AEGVcJL091094; Thu, 14 Nov 2024 16:31:38 GMT (envelope-from git) Date: Thu, 14 Nov 2024 16:31:38 GMT Message-Id: <202411141631.4AEGVcJL091094@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Palle Girgensohn Subject: git: f3fe33710cee - main - security/vuxml: Add CVEs for PostreSQL List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: girgen X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: f3fe33710cee7d5ae2b852096b64f803d1d39e2d Auto-Submitted: auto-generated The branch main has been updated by girgen: URL: https://cgit.FreeBSD.org/ports/commit/?id=f3fe33710cee7d5ae2b852096b64f803d1d39e2d commit f3fe33710cee7d5ae2b852096b64f803d1d39e2d Author: Palle Girgensohn AuthorDate: 2024-11-14 15:53:16 +0000 Commit: Palle Girgensohn CommitDate: 2024-11-14 16:29:07 +0000 security/vuxml: Add CVEs for PostreSQL --- security/vuxml/vuln/2024.xml | 241 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 241 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 26d525fd8766..47c386c1d48d 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,244 @@ + + PostgreSQL -- PL/Perl environment variable changes execute arbitrary code + + + postgresql17-plperl + 17.1 + + + postgresql16-plperl + 16.5 + + + postgresql15-plperl + 15.9 + + + postgresql14-plperl + 14.14 + + + postgresql13-plperl + 13.17 + + + postgresql12-plperl + 12.21 + + + + +

PostgreSQL project reports:

+
+

+ Incorrect control of environment variables in PostgreSQL + PL/Perl allows an unprivileged database user to change + sensitive process environment variables (e.g. PATH). + That often suffices to enable arbitrary code execution, + even if the attacker lacks a database server operating + system user. +

+
+ +
+ + CVE-2024-10979 + https://www.postgresql.org/support/security/CVE-2024-10979/ + + + 2024-11-14 + 2024-11-14 + +
+ + + PostgreSQL -- SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID + + + postgresql17-server + 17.1 + + + postgresql16-server + 16.5 + + + postgresql15-server + 15.9 + + + postgresql14-server + 14.14 + + + postgresql13-server + 13.17 + + + postgresql12-server + 12.21 + + + + +

PostgreSQL project reports:

+
+

+ Incorrect privilege assignment in PostgreSQL allows a + less-privileged application user to view or change + different rows from those intended. An attack requires + the application to use SET ROLE, SET SESSION + AUTHORIZATION, or an equivalent feature. The problem + arises when an application query uses parameters from + the attacker or conveys query results to the attacker. + If that query reacts to current_setting('role') or the + current user ID, it may modify or return data as though + the session had not used SET ROLE or SET SESSION + AUTHORIZATION. The attacker does not control which + incorrect user ID applies. Query text from + less-privileged sources is not a concern here, because + SET ROLE and SET SESSION AUTHORIZATION are not sandboxes + for unvetted queries +

+
+ +
+ + CVE-2024-10978 + https://www.postgresql.org/support/security/CVE-2024-10978/ + + + 2024-11-14 + 2024-11-14 + +
+ + + PostgreSQL -- libpq retains an error message from man-in-the-middle + + + postgresql17-client + 17.1 + + + postgresql16-client + 16.5 + + + postgresql15-client + 15.9 + + + postgresql14-client + 14.14 + + + postgresql13-client + 13.17 + + + postgresql12-client + 12.21 + + + + +

PostgreSQL project reports:

+
+

+ Client use of server error message in PostgreSQL allows + a server not trusted under current SSL or GSS settings + to furnish arbitrary non-NUL bytes to the libpq + application. For example, a man-in-the-middle attacker + could send a long error message that a human or + screen-scraper user of psql mistakes for valid query + results. This is probably not a concern for clients + where the user interface unambiguously indicates the + boundary between one error message and other text. +

+
+ +
+ + CVE-2024-10977 + https://www.postgresql.org/support/security/CVE-2024-10977/ + + + 2024-11-14 + 2024-11-14 + +
+ + + PostgreSQL -- PostgreSQL row security below e.g. subqueries disregards user ID changes + + + postgresql17-server + 17.1 + + + postgresql16-server + 16.5 + + + postgresql15-server + 15.9 + + + postgresql14-server + 14.14 + + + postgresql13-server + 13.17 + + + postgresql12-server + 12.21 + + + + +

PostgreSQL project reports:

+
+

+ Incomplete tracking in PostgreSQL of tables with row + security allows a reused query to view or change + different rows from those intended. CVE-2023-2455 and + CVE-2016-2193 fixed most interaction between row + security and user ID changes. They missed cases where a + subquery, WITH query, security invoker view, or + SQL-language function references a table with a + row-level security policy. This has the same + consequences as the two earlier CVEs. That is to say, it + leads to potentially incorrect policies being applied in + cases where role-specific policies are used and a given + query is planned under one role and then executed under + other roles. This scenario can happen under security + definer functions or when a common user and query is + planned initially and then re-used across multiple SET + ROLEs. + + Applying an incorrect policy may permit a user to complete + otherwise-forbidden reads and modifications. This affects only databases + that have used CREATE POLICY to define a row security policy. An + attacker must tailor an attack to a particular application's pattern of + query plan reuse, user ID changes, and role-specific row security + policies. +

+
+ +
+ + CVE-2024-10976 + https://www.postgresql.org/support/security/CVE-2024-10976/ + + + 2024-11-14 + 2024-11-14 + +
+ electron31 -- multiple vulnerabilities