J-Security Center

Title: PostgreSQL VACUUM Command Data Loss Vulnerability

Severity: MODERATE


PostgreSQL is a freely distributed Object-Relational DBMS. It is available for a number of platforms including Unix and Linux variants and Microsoft Windows operating systems.

PostgreSQL has been reported prone to a data loss vulnerability.

It has been reported that a non-privileged user may invoke the PostgreSQL VACUUM command to, in some circumstances, cause the system to prematurely remove transaction log information stored in 'pg_clog' files. This may ultimately result in data loss or a Denial of service condition.

It should be noted that all PostgreSQL version 7.2.* installations prior to 7.2.3 have been reported vulnerable.

Affected Products:

  • Conectiva Linux 8.0.0
  • Debian Linux 3.0.0
  • Debian Linux 3.0.0 alpha
  • Debian Linux 3.0.0 arm
  • Debian Linux 3.0.0 hppa
  • Debian Linux 3.0.0 ia-32
  • Debian Linux 3.0.0 ia-64
  • Debian Linux 3.0.0 m68k
  • Debian Linux 3.0.0 mips
  • Debian Linux 3.0.0 mipsel
  • Debian Linux 3.0.0 ppc
  • Debian Linux 3.0.0 s/390
  • Debian Linux 3.0.0 sparc
  • Gentoo Linux 0.5.0
  • Gentoo Linux 0.7.0
  • MandrakeSoft Linux Mandrake 8.2.0
  • MandrakeSoft Linux Mandrake 8.2.0 ppc
  • MandrakeSoft Linux Mandrake 9.0.0
  • PostgreSQL PostgreSQL 7.2.0
  • PostgreSQL PostgreSQL 7.2.1
  • PostgreSQL PostgreSQL 7.2.2
  • S.u.S.E. Linux 8.0.0
  • S.u.S.E. Linux 8.0.0 i386
  • Turbolinux Turbolinux Server 7.0.0
  • Turbolinux Turbolinux Server 8.0.0
  • Turbolinux Turbolinux Workstation 8.0.0


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.