Guard against unexpected dimensions of oidvector/int2vector. These data types are represented like full-fledged arrays, but functions that deal specifically with these types assume that the array is 1-dimensional and contains no nulls. However, there are cast pathways that allow general oid[] or int2[] arrays to be cast to these types, allowing these expectations to be violated. This can be exploited to cause server memory disclosure or SIGSEGV. Fix by installing explicit checks in functions that accept these types.
Reported-by: Altan Birler <[email protected]> Author: Tom Lane <[email protected]> Reviewed-by: Noah Misch <[email protected]> Security: CVE-2026-2003 Backpatch-through: 14 Branch ------ REL_17_STABLE Details ------- https://git.postgresql.org/pg/commitdiff/3d160401b65e1d37ca19cf9b78d01aac53ac9605 Modified Files -------------- src/backend/access/hash/hashfunc.c | 3 +++ src/backend/access/nbtree/nbtcompare.c | 4 ++++ src/backend/utils/adt/format_type.c | 6 +++++- src/backend/utils/adt/int.c | 31 ++++++++++++++++++++++++++++++- src/backend/utils/adt/oid.c | 31 ++++++++++++++++++++++++++++++- src/include/utils/builtins.h | 1 + src/test/regress/expected/arrays.out | 5 +++++ src/test/regress/sql/arrays.sql | 4 ++++ 8 files changed, 82 insertions(+), 3 deletions(-)
