Improper validation of type oidvector in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Postgresql | Postgresql | 14.0 (including) | 14.21 (excluding) |
| Postgresql | Postgresql | 15.0 (including) | 15.16 (excluding) |
| Postgresql | Postgresql | 16.0 (including) | 16.12 (excluding) |
| Postgresql | Postgresql | 17.0 (including) | 17.8 (excluding) |
| Postgresql | Postgresql | 18.0 (including) | 18.2 (excluding) |
| Red Hat Enterprise Linux 10 | RedHat | postgresql16-0:16.13-1.el10_1 | * |
| Red Hat Enterprise Linux 10.0 Extended Update Support | RedHat | postgresql16-0:16.13-1.el10_0 | * |
| Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions | RedHat | postgresql:15-8080020260306092921.63b34585 | * |
| Red Hat Enterprise Linux 9 | RedHat | postgresql-0:13.23-2.el9_7 | * |
| Red Hat Enterprise Linux 9 | RedHat | postgresql:15-9070020260227094950.rhel9 | * |
| Red Hat Enterprise Linux 9 | RedHat | postgresql:16-9070020260227095951.rhel9 | * |
| Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | RedHat | postgresql:15-9020020260309133405.rhel9 | * |
| Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | postgresql:16-9040020260306102041.rhel9 | * |
| Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | postgresql:15-9040020260305163703.rhel9 | * |
| Red Hat Enterprise Linux 9.6 Extended Update Support | RedHat | postgresql:15-9060020260309125703.rhel9 | * |
| Red Hat Enterprise Linux 9.6 Extended Update Support | RedHat | postgresql:16-9060020260305153549.rhel9 | * |
| Postgresql-10 | Ubuntu | upstream | * |
| Postgresql-12 | Ubuntu | upstream | * |
| Postgresql-14 | Ubuntu | jammy | * |
| Postgresql-16 | Ubuntu | noble | * |
| Postgresql-17 | Ubuntu | questing | * |
| Postgresql-18 | Ubuntu | devel | * |
| Postgresql-9.3 | Ubuntu | upstream | * |
| Postgresql-9.5 | Ubuntu | upstream | * |
When input does not comply with the expected type, attackers could trigger unexpected errors, cause incorrect actions to take place, or exploit latent vulnerabilities that would not be possible if the input conformed with the expected type. This weakness can appear in type-unsafe programming languages, or in programming languages that support casting or conversion of an input to another type.