Show plain JSON{"acknowledgement": "Upstream acknowledges Tom Lane as the original reporter.", "affected_release": [{"advisory": "RHBA-2021:3472", "cpe": "cpe:/a:redhat:ansible_automation_platform:3.8::el7", "package": "ansible-tower-38/ansible-tower-rhel7:3.8.4-1", "product_name": "Red Hat Ansible Tower 3.8 for RHEL 7", "release_date": "2021-09-08T00:00:00Z"}, {"advisory": "RHSA-2021:2397", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "postgresql-0:9.2.24-7.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2360", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "postgresql:9.6-8040020210602182503.522a0ee4", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-06-09T00:00:00Z"}, {"advisory": "RHSA-2021:2361", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "postgresql:10-8040020210602185500.522a0ee4", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-06-09T00:00:00Z"}, {"advisory": "RHSA-2021:2372", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "postgresql:12-8040020210604112312.522a0ee4", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-06-10T00:00:00Z"}, {"advisory": "RHSA-2021:2375", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "postgresql:13-8040020210602192705.522a0ee4", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2021-06-10T00:00:00Z"}, {"advisory": "RHSA-2021:2392", "cpe": "cpe:/a:redhat:rhel_eus:8.1", "package": "postgresql:10-8010020210602183449.c27ad7f8", "product_name": "Red Hat Enterprise Linux 8.1 Extended Update Support", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2393", "cpe": "cpe:/a:redhat:rhel_eus:8.1", "package": "postgresql:9.6-8010020210602124713.c27ad7f8", "product_name": "Red Hat Enterprise Linux 8.1 Extended Update Support", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2389", "cpe": "cpe:/a:redhat:rhel_eus:8.2", "package": "postgresql:12-8020020210602190140.4cda2c84", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2390", "cpe": "cpe:/a:redhat:rhel_eus:8.2", "package": "postgresql:10-8020020210602183649.4cda2c84", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2391", "cpe": "cpe:/a:redhat:rhel_eus:8.2", "package": "postgresql:9.6-8020020210602142035.4cda2c84", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2394", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql12-postgresql-0:12.7-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2395", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql10-postgresql-0:10.17-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2396", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql13-postgresql-0:13.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2394", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql12-postgresql-0:12.7-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2395", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql10-postgresql-0:10.17-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS", "release_date": "2021-06-14T00:00:00Z"}, {"advisory": "RHSA-2021:2396", "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7", "package": "rh-postgresql13-postgresql-0:13.3-1.el7", "product_name": "Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS", "release_date": "2021-06-14T00:00:00Z"}], "bugzilla": {"description": "postgresql: Buffer overrun from integer overflow in array subscripting calculations", "id": "1956876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956876"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.8", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-190->CWE-119", "details": ["A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "A flaw was found in postgresql. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."], "mitigation": {"lang": "en:us", "value": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible."}, "name": "CVE-2021-32027", "package_state": [{"cpe": "cpe:/a:redhat:openshift_application_runtimes:1.0", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat build of Quarkus"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat Decision Manager 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "postgresql", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "libpq", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/a:redhat:jboss_fuse:7", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat Fuse 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6", "fix_state": "Out of support scope", "package_name": "postgresql", "product_name": "Red Hat JBoss Enterprise Application Platform 6"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat JBoss Enterprise Application Platform 7"}, {"cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7", "fix_state": "Not affected", "package_name": "postgresql", "product_name": "Red Hat Process Automation 7"}], "public_date": "2021-05-13T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2021-32027\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-32027\nhttps://www.postgresql.org/support/security/CVE-2021-32027/"], "statement": "Writing arbitrary bytes to a wide area of server memory can provide a powerful primitive that could ultimately lead to remote code execution. For this reason this flaw has been rated as having a security impact of Important. The versions of `postgresql` as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Software Collections are all affected by this flaw. A future update may address this issue.", "threat_severity": "Important"}