CVE-2021-3677: Memory disclosure in certain queries Versions Affected: 11 - 13. "A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting."
Please bump 13.4, 12.8, 11.13.
If/when it's ready to stable, please file a new stabilisation bug and have it block this one. Thanks!
GLSA request filed.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=694f26b01e42989d9051936ddeae825e13b4acb3 commit 694f26b01e42989d9051936ddeae825e13b4acb3 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2022-11-19 03:33:11 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-11-22 03:59:39 +0000 [ GLSA 202211-04 ] PostgreSQL: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/793734 Bug: https://bugs.gentoo.org/808984 Bug: https://bugs.gentoo.org/823125 Bug: https://bugs.gentoo.org/865255 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: John Helmert III <ajak@gentoo.org> glsa-202211-04.xml | 87 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 87 insertions(+)
GLSA released, all done!