Bug 2001857 (CVE-2021-3677)

Summary: CVE-2021-3677 postgresql: memory disclosure in certain queries
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, akoufoud, alazarot, anon.amish, anstephe, asakala, avibelli, bdettelb, bgeorges, bibryam, chazlett, clement.escoffier, dandread, databases-maint, devrim, dfediuck, dkreling, drieden, eric.wittmann, etirelli, fcanogab, fjansen, fjanus, gmalinko, gmorling, gsmet, hamadhan, hbraun, hhorak, ibek, janstey, jmlich83, jnethert, jochrist, jorton, jpallich, jpechane, jrokos, jstastny, jwon, kaycoth, kkinge, krathod, kverlaen, lthon, michal.skrivanek, mike, mkushwah, mnovotny, mperina, mpoole, mszynkie, nobody, panovotn, pantinor, pdelbell, peholase, pgallagh, pjindal, pkubat, praiskup, probinso, psegedy, rrajasek, rruss, rsvoboda, saydas, sbiarozk, sbonazzo, sdouglas, surpatil, tgl, thomas.sords, tzimanyi, zconnor
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: postgresql 13.4, postgresql 12.8, postgresql 11.13 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-07 18:32:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2001858, 2001859, 2001860, 2001861, 2001862, 2001863, 2001864, 2002221, 2007213, 2007214, 2007215, 2007216, 2007217, 2008084, 2008085, 2023199, 2023201, 2023202, 2023203, 2023761, 2024608, 2024609, 2024677    
Bug Blocks: 1989353, 2001865    

Description msiddiqu 2021-09-07 11:03:42 UTC
A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.

Comment 1 msiddiqu 2021-09-07 11:05:01 UTC
Created mingw-postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001858]


Created postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001864]


Created postgresql:10/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001859]


Created postgresql:11/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001860]


Created postgresql:12/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001861]


Created postgresql:13/postgresql tracking bugs for this issue:

Affects: fedora-all [bug 2001862]


Created postgresql:9.6/postgresql tracking bugs for this issue:

Affects: fedora-34 [bug 2001863]

Comment 3 Sandro Bonazzola 2021-09-09 12:32:41 UTC
What about postgresql shipped with RHEL? I see only fedora trackers here.

Comment 7 Jonathan Christison 2021-09-20 13:20:56 UTC
Thanks @Chess, correct

Comment 18 errata-xmlrpc 2021-12-16 11:45:46 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2021:5179 https://access.redhat.com/errata/RHSA-2021:5179

Comment 19 errata-xmlrpc 2021-12-16 18:19:32 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2021:5197 https://access.redhat.com/errata/RHSA-2021:5197

Comment 20 errata-xmlrpc 2021-12-21 09:57:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:5235 https://access.redhat.com/errata/RHSA-2021:5235

Comment 21 errata-xmlrpc 2021-12-21 09:58:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:5236 https://access.redhat.com/errata/RHSA-2021:5236

Comment 27 errata-xmlrpc 2022-06-07 15:22:51 UTC
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for Red Hat Enterprise Linux 8

Via RHSA-2022:4931 https://access.redhat.com/errata/RHSA-2022:4931

Comment 28 Product Security DevOps Team 2022-06-07 18:32:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3677