CVE-2024-0985 Affecting postgresql-13 package, versions <13.14-0+deb11u1


0.0
high

Snyk CVSS

    Attack Complexity Low
    User Interaction Required
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.05% (18th percentile)
Expand this section
NVD
8 high
Expand this section
Red Hat
8 high
Expand this section
SUSE
8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN11-POSTGRESQL13-6239516
  • published 9 Feb 2024
  • disclosed 8 Feb 2024

How to fix?

Upgrade Debian:11 postgresql-13 to version 13.14-0+deb11u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql-13 package and not the postgresql-13 package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability.