First published: Thu Nov 14 2024(Updated: )
Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
Credit: f86ef6dc-4d3a-42ad-8f28-e6d5547a5007
Affected Software | Affected Version | How to fix |
---|---|---|
debian/postgresql-13 | <=13.16-0+deb11u1 | 13.18-0+deb11u1 |
debian/postgresql-15 | <=15.8-0+deb12u1 | 15.10-0+deb12u1 |
debian/postgresql-16 | <=16.4-3 | |
debian/postgresql-17 | 17.2-1 | |
PostgreSQL Common | >=12.0<12.21 | |
PostgreSQL Common | >=13.0<13.17 | |
PostgreSQL Common | >=14.0<14.14 | |
PostgreSQL Common | >=15.0<15.9 | |
PostgreSQL Common | >=16.0<16.5 | |
PostgreSQL Common | =17.0 | |
PostgreSQL Common | =17.0-beta1 | |
PostgreSQL Common | =17.0-beta2 | |
PostgreSQL Common | =17.0-beta3 | |
PostgreSQL Common | =17.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10977 has been classified with a high severity due to its potential for exploitation by a man-in-the-middle attacker.
To fix CVE-2024-10977, update to PostgreSQL version 13.18-0+deb11u1, 15.10-0+deb12u1, or 17.2-1.
Affected PostgreSQL versions include 13.16-0+deb11u1 and earlier, 15.8-0+deb12u1 and earlier, and 16.4-3 and earlier.
CVE-2024-10977 can facilitate man-in-the-middle attacks that exploit server error messages to send arbitrary non-NUL bytes.
CVE-2024-10977 is specifically noted for Debian packages of PostgreSQL.