{"schema_version":"1.7.2","id":"OESA-2024-2054","modified":"2024-08-23T11:08:57Z","published":"2024-08-23T11:08:57Z","upstream":["CVE-2024-7348"],"summary":"postgresql security update","details":"PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you\u0026apos;ll need to access a PostgreSQL DBMS server.\r\n\r\nSecurity Fix(es):\r\n\r\nTime-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.(CVE-2024-7348)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"postgresql","purl":"pkg:rpm/openEuler/postgresql\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.8-1.oe2403"}]}],"ecosystem_specific":{"aarch64":["postgresql-15.8-1.oe2403.aarch64.rpm","postgresql-contrib-15.8-1.oe2403.aarch64.rpm","postgresql-debuginfo-15.8-1.oe2403.aarch64.rpm","postgresql-debugsource-15.8-1.oe2403.aarch64.rpm","postgresql-docs-15.8-1.oe2403.aarch64.rpm","postgresql-llvmjit-15.8-1.oe2403.aarch64.rpm","postgresql-plperl-15.8-1.oe2403.aarch64.rpm","postgresql-plpython3-15.8-1.oe2403.aarch64.rpm","postgresql-pltcl-15.8-1.oe2403.aarch64.rpm","postgresql-private-devel-15.8-1.oe2403.aarch64.rpm","postgresql-private-libs-15.8-1.oe2403.aarch64.rpm","postgresql-server-15.8-1.oe2403.aarch64.rpm","postgresql-server-devel-15.8-1.oe2403.aarch64.rpm","postgresql-static-15.8-1.oe2403.aarch64.rpm","postgresql-test-15.8-1.oe2403.aarch64.rpm"],"noarch":["postgresql-test-rpm-macros-15.8-1.oe2403.noarch.rpm"],"src":["postgresql-15.8-1.oe2403.src.rpm"],"x86_64":["postgresql-15.8-1.oe2403.x86_64.rpm","postgresql-contrib-15.8-1.oe2403.x86_64.rpm","postgresql-debuginfo-15.8-1.oe2403.x86_64.rpm","postgresql-debugsource-15.8-1.oe2403.x86_64.rpm","postgresql-docs-15.8-1.oe2403.x86_64.rpm","postgresql-llvmjit-15.8-1.oe2403.x86_64.rpm","postgresql-plperl-15.8-1.oe2403.x86_64.rpm","postgresql-plpython3-15.8-1.oe2403.x86_64.rpm","postgresql-pltcl-15.8-1.oe2403.x86_64.rpm","postgresql-private-devel-15.8-1.oe2403.x86_64.rpm","postgresql-private-libs-15.8-1.oe2403.x86_64.rpm","postgresql-server-15.8-1.oe2403.x86_64.rpm","postgresql-server-devel-15.8-1.oe2403.x86_64.rpm","postgresql-static-15.8-1.oe2403.x86_64.rpm","postgresql-test-15.8-1.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2054"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7348"}],"database_specific":{"severity":"High"}}