{"id":"CVE-2021-32028","details":"A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.","aliases":["BIT-postgresql-2021-32028"],"modified":"2026-03-23T04:59:24.718138Z","published":"2021-10-11T17:15:07.727Z","related":["ALSA-2021:2360","ALSA-2021:2372","ALSA-2021:2375","SUSE-SU-2021:1782-1","SUSE-SU-2021:1783-1","SUSE-SU-2021:1784-1","SUSE-SU-2021:1785-1","SUSE-SU-2021:1785-2","SUSE-SU-2021:1970-1","SUSE-SU-2021:1994-1","SUSE-SU-2021:2777-1","SUSE-SU-2021:3481-1","SUSE-SU-2022:2958-1","openSUSE-SU-2021:0894-1","openSUSE-SU-2021:1785-1","openSUSE-SU-2021:1970-1","openSUSE-SU-2021:1994-1","openSUSE-SU-2024:11184-1","openSUSE-SU-2024:11185-1","openSUSE-SU-2024:11186-1","openSUSE-SU-2024:11187-1","openSUSE-SU-2024:12387-1","openSUSE-SU-2024:13243-1","openSUSE-SU-2024:14360-1","openSUSE-SU-2025:15580-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202211-04"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211112-0003/"},{"type":"ADVISORY","url":"https://www.postgresql.org/support/security/CVE-2021-32028"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1956877"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"9.6.0"},{"fixed":"9.6.22"}]},{"events":[{"introduced":"10.0"},{"fixed":"10.17"}]},{"events":[{"introduced":"11.0"},{"fixed":"11.12"}]},{"events":[{"introduced":"12.0"},{"fixed":"12.7"}]},{"events":[{"introduced":"13.0"},{"fixed":"13.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32028.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}