First published: Tue May 04 2021(Updated: )
PostgreSQL could allow a remote authenticated attacker to obtain sensitive information, caused by an error when using an UPDATE…RETURNING command on a purpose-crafted table. An attacker could exploit this vulnerability to read arbitrary bytes of server memory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Verify Access | <=10.0.0 | |
redhat/postgresql | <13.3 | 13.3 |
redhat/postgresql | <12.7 | 12.7 |
redhat/postgresql | <11.12 | 11.12 |
PostgreSQL PostgreSQL | >=11.0<11.12 | |
PostgreSQL PostgreSQL | >=12.0<12.7 | |
PostgreSQL PostgreSQL | >=13.0<13.3 | |
Redhat Jboss Enterprise Application Platform | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security flaw is CVE-2021-32029.
The severity level of CVE-2021-32029 is medium.
A remote authenticated attacker can exploit CVE-2021-32029 by using an UPDATE...RETURNING command on a purpose-crafted table to obtain sensitive information.
IBM Security Verify Access (up to version 10.0.0), PostgreSQL (versions 11.0 to 11.12), PostgreSQL (versions 12.0 to 12.7), PostgreSQL (versions 13.0 to 13.3), and Redhat Jboss Enterprise Application Platform (version 7.0.0) are affected by CVE-2021-32029.
You can find more information about CVE-2021-32029 at the following references: [1] [2] [3].