CVE-2024-7348
Publication date 8 August 2024
Last updated 14 November 2024
Ubuntu priority
Cvss 3 Severity Score
Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.
Status
Package | Ubuntu Release | Status |
---|---|---|
postgresql-10 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 10.23-0ubuntu0.18.04.2+esm2
|
|
postgresql-12 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Fixed 12.20-0ubuntu0.20.04.1
|
|
postgresql-14 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Fixed 14.13-0ubuntu0.22.04.1
|
|
20.04 LTS focal | Not in release | |
postgresql-16 | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Fixed 16.4-0ubuntu0.24.04.1
|
|
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
postgresql-9.1 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
postgresql-9.3 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
14.04 LTS trusty |
Fixed 9.3.24-0ubuntu0.14.04+esm1
|
|
postgresql-9.5 | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
16.04 LTS xenial |
Fixed 9.5.25-0ubuntu0.16.04.1+esm8
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
leosilva
PostgreSQL 9.3 is end of life upstream, and no updates are are available. Marking as deferred in -esm-main releases.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6968-1
- PostgreSQL vulnerability
- 19 August 2024
- USN-6968-2
- PostgreSQL vulnerability
- 19 September 2024
- USN-6968-3
- PostgreSQL vulnerability
- 14 October 2024