A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2001857 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202211-04 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220407-0008/ | Third Party Advisory |
https://www.postgresql.org/support/security/CVE-2021-3677/ | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2001857 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202211-04 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220407-0008/ | Third Party Advisory |
https://www.postgresql.org/support/security/CVE-2021-3677/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2001857 - Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202211-04 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20220407-0008/ - Third Party Advisory | |
References | () https://www.postgresql.org/support/security/CVE-2021-3677/ - Vendor Advisory |
22 Nov 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-200 |
01 Jun 2022, 20:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220407-0008/ - Third Party Advisory |
08 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Mar 2022, 20:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.5 |
References | (MISC) https://www.postgresql.org/support/security/CVE-2021-3677/ - Vendor Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2001857 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
02 Mar 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-02 23:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3677
Mitre link : CVE-2021-3677
CVE.ORG link : CVE-2021-3677
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux
- enterprise_linux_for_ibm_z_systems
- virtualization
- enterprise_linux_for_power_little_endian
- software_collections
postgresql
- postgresql
CWE