A purpose-crafted query can read arbitrary bytes of server memory. In the
default configuration, any authenticated database user can complete this
attack at will. The attack does not require the ability to create objects.
If server settings include max_worker_processes=0
, the known versions of this
attack are infeasible. However, undiscovered variants of the attack may be
independent of that setting.
Affected Version | Fixed In | Fix Published |
---|---|---|
13 | 13.4 | Aug. 12, 2021 |
12 | 12.8 | Aug. 12, 2021 |
11 | 11.13 | Aug. 12, 2021 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 6.5 |
---|---|
Component | core server |
Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org.
For reporting non-security bugs, please see the Report a Bug page.