CVE-2024-10979

NameCVE-2024-10979
DescriptionIncorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH). That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5812-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postgresql-13 (PTS)bullseye13.16-0+deb11u1vulnerable
bullseye (security)13.17-0+deb11u1vulnerable
postgresql-15 (PTS)bookworm15.8-0+deb12u1vulnerable
bookworm (security)15.9-0+deb12u1fixed
postgresql-16 (PTS)sid, trixie16.4-3vulnerable
postgresql-17 (PTS)trixie17.0-1vulnerable
sid17.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postgresql-13source(unstable)(unfixed)
postgresql-15sourcebookworm15.9-0+deb12u1DSA-5812-1
postgresql-15source(unstable)(unfixed)
postgresql-16source(unstable)(unfixed)
postgresql-17source(unstable)17.1-1

Notes

https://www.postgresql.org/support/security/CVE-2024-10979/

Search for package or bug name: Reporting problems