A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
Created mingw-postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001858] Created postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001864] Created postgresql:10/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001859] Created postgresql:11/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001860] Created postgresql:12/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001861] Created postgresql:13/postgresql tracking bugs for this issue: Affects: fedora-all [bug 2001862] Created postgresql:9.6/postgresql tracking bugs for this issue: Affects: fedora-34 [bug 2001863]
What about postgresql shipped with RHEL? I see only fedora trackers here.
Thanks @Chess, correct
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2021:5179 https://access.redhat.com/errata/RHSA-2021:5179
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2021:5197 https://access.redhat.com/errata/RHSA-2021:5197
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:5235 https://access.redhat.com/errata/RHSA-2021:5235
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:5236 https://access.redhat.com/errata/RHSA-2021:5236
This issue has been addressed in the following products: Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 Via RHSA-2022:4931 https://access.redhat.com/errata/RHSA-2022:4931
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3677