SUSE update for postgresql16



Published: 2024-09-09
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-7348
CWE-ID CWE-367
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Linux Enterprise Software Development Kit 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 12
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 12
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 12
Operating systems & Components / Operating system

libecpg6-32bit
Operating systems & Components / Operating system package or component

libpq5-debuginfo-32bit
Operating systems & Components / Operating system package or component

libecpg6-debuginfo-32bit
Operating systems & Components / Operating system package or component

libpq5-32bit
Operating systems & Components / Operating system package or component

postgresql16-docs
Operating systems & Components / Operating system package or component

libpq5
Operating systems & Components / Operating system package or component

postgresql16-server
Operating systems & Components / Operating system package or component

libecpg6
Operating systems & Components / Operating system package or component

postgresql16-contrib-debuginfo
Operating systems & Components / Operating system package or component

libpq5-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-pltcl-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-pltcl
Operating systems & Components / Operating system package or component

libecpg6-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-debuginfo
Operating systems & Components / Operating system package or component

postgresql16
Operating systems & Components / Operating system package or component

postgresql16-contrib
Operating systems & Components / Operating system package or component

postgresql16-plpython
Operating systems & Components / Operating system package or component

postgresql16-plperl-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-debugsource
Operating systems & Components / Operating system package or component

postgresql16-plpython-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-plperl
Operating systems & Components / Operating system package or component

postgresql16-server-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-devel
Operating systems & Components / Operating system package or component

postgresql16-server-devel
Operating systems & Components / Operating system package or component

postgresql16-devel-debuginfo
Operating systems & Components / Operating system package or component

postgresql16-server-devel-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Time-of-check Time-of-use (TOCTOU) Race Condition

EUVDB-ID: #VU95605

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-7348

CWE-ID: CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges within the database.

The vulnerability exists due to a race condition when executing concurrent pg_dump sessions. A remote user with privileges to create and drop non-temporary objects can execute arbitrary SQL commands with the privileges of the role running pg_dump (which is often a superuser).

Mitigation

Update the affected package postgresql16 to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Software Development Kit 12: SP5

SUSE Linux Enterprise Server for SAP Applications 12: SP5

SUSE Linux Enterprise Server 12: SP5

SUSE Linux Enterprise High Performance Computing 12: SP5

libecpg6-32bit: before 16.4-3.16.1

libpq5-debuginfo-32bit: before 16.4-3.16.1

libecpg6-debuginfo-32bit: before 16.4-3.16.1

libpq5-32bit: before 16.4-3.16.1

postgresql16-docs: before 16.4-3.16.1

libpq5: before 16.4-3.16.1

postgresql16-server: before 16.4-3.16.1

libecpg6: before 16.4-3.16.1

postgresql16-contrib-debuginfo: before 16.4-3.16.1

libpq5-debuginfo: before 16.4-3.16.1

postgresql16-pltcl-debuginfo: before 16.4-3.16.1

postgresql16-pltcl: before 16.4-3.16.1

libecpg6-debuginfo: before 16.4-3.16.1

postgresql16-debuginfo: before 16.4-3.16.1

postgresql16: before 16.4-3.16.1

postgresql16-contrib: before 16.4-3.16.1

postgresql16-plpython: before 16.4-3.16.1

postgresql16-plperl-debuginfo: before 16.4-3.16.1

postgresql16-debugsource: before 16.4-3.16.1

postgresql16-plpython-debuginfo: before 16.4-3.16.1

postgresql16-plperl: before 16.4-3.16.1

postgresql16-server-debuginfo: before 16.4-3.16.1

postgresql16-devel: before 16.4-3.16.1

postgresql16-server-devel: before 16.4-3.16.1

postgresql16-devel-debuginfo: before 16.4-3.16.1

postgresql16-server-devel-debuginfo: before 16.4-3.16.1

CPE2.3 External links

http://www.suse.com/support/update/announcement/2024/suse-su-20243181-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###