Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20240811232423.GA27506@openwall.com>
Date: Mon, 12 Aug 2024 01:24:23 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL

Hi,

PostgreSQL 16.4, 15.8, 14.13, 13.16, 12.20 released on August 8 fix the
below security issue.

Content from https://www.postgresql.org/support/security/CVE-2024-7348/

> CVE-2024-7348
> PostgreSQL relation replacement during pg_dump executes arbitrary SQL
> 
> Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in
> PostgreSQL allows an object creator to execute arbitrary SQL functions
> as the user running pg_dump, which is often a superuser. The attack
> involves replacing another relation type with a view or foreign table.
> The attack requires waiting for pg_dump to start, but winning the race
> condition is trivial if the attacker retains an open transaction.
> Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are
> affected.
> 
> The PostgreSQL project thanks Noah Misch for reporting this problem.

> CVSS 3.0
> Overall Score 	8.8
> Component 	core server
> Vector 	AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.