This bug was fixed in the package postgresql-16 - 16.4-0ubuntu0.24.04.1
---------------
postgresql-16 (16.4-0ubuntu0.24.04.1) noble-security; urgency=medium
* New upstream version (LP: #2076183).
+ A dump/restore is not required for those running 16.X.
+ However, if you are upgrading from a version earlier than 16.3, see
those release notes as well please.
+ Prevent unauthorized code execution during pg_dump (Masahiko
Sawada)
An attacker able to create and drop non-temporary objects could inject
SQL code that would be executed by a concurrent pg_dump session with the
privileges of the role running pg_dump (which is often a superuser).
The attack involves replacing a sequence or similar object with a view
or foreign table that will execute malicious code. To prevent this,
introduce a new server parameter restrict_nonsystem_relation_kind that
can disable expansion of non-builtin views as well as access to foreign
tables, and teach pg_dump to set it when available. Note that the
attack is prevented only if both pg_dump and the server it is dumping
from are new enough to have this fix.
The PostgreSQL Project thanks Noah Misch for reporting this problem.
(CVE-2024-7348)
+ Details about these and many further changes can be found at:
https://www.postgresql.org/docs/16/release-16-4.html.
* d/postgresql-16.NEWS: Update.
-- Athos Ribeiro <[email protected]> Tue, 06 Aug 2024
15:13:57 -0300
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076183
Title:
New upstream microreleases 12.20, 14.13, and 16.4
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-16/+bug/2076183/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs