Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3954-1 | postgresql-13 security update |
Debian DSA |
DSA-5812-1 | postgresql-15 security update |
EUVD |
EUVD-2024-33375 | Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. |
Ubuntu USN |
USN-7132-1 | PostgreSQL vulnerabilities |
Ubuntu USN |
USN-7358-1 | PostgreSQL vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 20 Feb 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Postgresql
Postgresql postgresql |
|
| Weaknesses | CWE-345 | |
| CPEs | cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql:17.0:-:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql:17.0:beta1:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql:17.0:beta2:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql:17.0:beta3:*:*:*:*:*:* cpe:2.3:a:postgresql:postgresql:17.0:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Postgresql
Postgresql postgresql |
Fri, 22 Nov 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 14 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Nov 2024 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Client use of server error message in PostgreSQL allows a server not trusted under current SSL or GSS settings to furnish arbitrary non-NUL bytes to the libpq application. For example, a man-in-the-middle attacker could send a long error message that a human or screen-scraper user of psql mistakes for valid query results. This is probably not a concern for clients where the user interface unambiguously indicates the boundary between one error message and other text. Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected. | |
| Title | PostgreSQL libpq retains an error message from man-in-the-middle | |
| Weaknesses | CWE-348 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: PostgreSQL
Published:
Updated: 2025-11-03T21:51:38.414Z
Reserved: 2024-11-07T19:27:03.261Z
Link: CVE-2024-10977
Updated: 2025-11-03T21:51:38.414Z
Status : Modified
Published: 2024-11-14T13:15:04.023
Modified: 2025-11-03T22:16:36.810
Link: CVE-2024-10977
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN