A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| postgresql | postgresql | 11.0 - 11.22 | - |
| postgresql | postgresql | 12.0 - 12.17 | - |
| postgresql | postgresql |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
49
Affected Products
68
References
postgresql / postgresql
| 13.0 - 13.13 |
| - |
| postgresql | postgresql | 14.0 - 14.10 | - |
| postgresql | postgresql | 15.0 - 15.5 | - |
| postgresql | postgresql | - | - |
| redhat | codeready_linux_builder_eus | - | - |
| redhat | codeready_linux_builder_eus_for_power_little_endian_eus | - | - |
| redhat | codeready_linux_builder_eus_for_power_little_endian_eus | - | - |
| redhat | codeready_linux_builder_for_arm64_eus | - | - |
| redhat | codeready_linux_builder_for_arm64_eus | - | - |
| redhat | codeready_linux_builder_for_arm64_eus | - | - |
| redhat | codeready_linux_builder_for_ibm_z_systems_eus | - | - |
| redhat | codeready_linux_builder_for_ibm_z_systems_eus | - | - |
| redhat | codeready_linux_builder_for_power_little_endian_eus | - | - |
| redhat | codeready_linux_builder_for_power_little_endian_eus | - | - |
| redhat | software_collections | - | - |
| redhat | enterprise_linux | - | - |
| redhat | enterprise_linux | - | - |
| redhat | enterprise_linux_desktop | - | - |
| redhat | enterprise_linux_eus | - | - |
| redhat | enterprise_linux_eus | - | - |
| redhat | enterprise_linux_eus | - | - |
| redhat | enterprise_linux_eus | - | - |
| redhat | enterprise_linux_for_arm_64 | - | - |
| redhat | enterprise_linux_for_arm_64 | - | - |
| redhat | enterprise_linux_for_ibm_z_systems | - | - |
| redhat | enterprise_linux_for_ibm_z_systems | - | - |
| redhat | enterprise_linux_for_ibm_z_systems_eus | - | - |
| redhat | enterprise_linux_for_ibm_z_systems_eus | - | - |
| redhat | enterprise_linux_for_ibm_z_systems_eus | - | - |
| redhat | enterprise_linux_for_ibm_z_systems_eus | - | - |
| redhat | enterprise_linux_for_power_big_endian | - | - |
| redhat | enterprise_linux_for_power_little_endian | - | - |
| redhat | enterprise_linux_for_power_little_endian | - | - |
| redhat | enterprise_linux_for_power_little_endian_eus | - | - |
| redhat | enterprise_linux_for_power_little_endian_eus | - | - |
| redhat | enterprise_linux_for_power_little_endian_eus | - | - |
| redhat | enterprise_linux_for_power_little_endian_eus | - | - |
| redhat | enterprise_linux_for_scientific_computing | - | - |
| redhat | enterprise_linux_server | - | - |
| redhat | enterprise_linux_server_aus | - | - |
| redhat | enterprise_linux_server_aus | - | - |
| redhat | enterprise_linux_server_aus | - | - |
| redhat | enterprise_linux_server_aus | - | - |
| redhat | enterprise_linux_server_tus | - | - |
| redhat | enterprise_linux_server_tus | - | - |
| redhat | enterprise_linux_server_tus | - | - |
| redhat | enterprise_linux_workstation | - | - |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact