vulnerability
Rocky Linux: CVE-2024-7348: postgresql-15 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | Aug 8, 2024 | Sep 17, 2024 | May 8, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Aug 8, 2024
Added
Sep 17, 2024
Modified
May 8, 2025
Description
Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.
Solution(s)
rocky-upgrade-pg_repackrocky-upgrade-pg_repack-debuginforocky-upgrade-pg_repack-debugsourcerocky-upgrade-pgauditrocky-upgrade-pgaudit-debuginforocky-upgrade-pgaudit-debugsourcerocky-upgrade-postgres-decoderbufsrocky-upgrade-postgres-decoderbufs-debuginforocky-upgrade-postgres-decoderbufs-debugsourcerocky-upgrade-postgresqlrocky-upgrade-postgresql-contribrocky-upgrade-postgresql-contrib-debuginforocky-upgrade-postgresql-debuginforocky-upgrade-postgresql-debugsourcerocky-upgrade-postgresql-docsrocky-upgrade-postgresql-docs-debuginforocky-upgrade-postgresql-plperlrocky-upgrade-postgresql-plperl-debuginforocky-upgrade-postgresql-plpython3rocky-upgrade-postgresql-plpython3-debuginforocky-upgrade-postgresql-pltclrocky-upgrade-postgresql-pltcl-debuginforocky-upgrade-postgresql-private-develrocky-upgrade-postgresql-private-libsrocky-upgrade-postgresql-private-libs-debuginforocky-upgrade-postgresql-serverrocky-upgrade-postgresql-server-debuginforocky-upgrade-postgresql-server-develrocky-upgrade-postgresql-server-devel-debuginforocky-upgrade-postgresql-staticrocky-upgrade-postgresql-testrocky-upgrade-postgresql-test-debuginforocky-upgrade-postgresql-upgraderocky-upgrade-postgresql-upgrade-debuginforocky-upgrade-postgresql-upgrade-develrocky-upgrade-postgresql-upgrade-devel-debuginfo
References
- CVE-2024-7348
- https://attackerkb.com/topics/CVE-2024-7348
- URL-https://errata.rockylinux.org/RLSA-2024:5927
- URL-https://errata.rockylinux.org/RLSA-2024:5929
- URL-https://errata.rockylinux.org/RLSA-2024:5999
- URL-https://errata.rockylinux.org/RLSA-2024:6000
- URL-https://errata.rockylinux.org/RLSA-2024:6001
- URL-https://errata.rockylinux.org/RLSA-2024:6018
- URL-https://errata.rockylinux.org/RLSA-2024:6020

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.