Using an UPDATE ... RETURNING
on a purpose-crafted partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can create prerequisite objects and complete this attack at will. A user lacking the CREATE
and TEMPORARY
privileges on all databases and the CREATE
privilege on all schemas typically cannot use this attack at will.
The PostgreSQL project thanks Tom Lane for reporting this problem.
Affected Version | Fixed In | Fix Published |
---|---|---|
13 | 13.3 | May 13, 2021 |
12 | 12.7 | May 13, 2021 |
11 | 11.12 | May 13, 2021 |
For more information about PostgreSQL versioning, please visit the versioning page.
Overall Score | 6.5 |
---|---|
Component | core server |
Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org.
For reporting non-security bugs, please see the Report a Bug page.