{"schema_version":"1.7.2","id":"OESA-2026-2413","modified":"2026-05-22T13:19:09Z","published":"2026-05-22T13:19:09Z","upstream":["CVE-2026-6472","CVE-2026-6473","CVE-2026-6474","CVE-2026-6475","CVE-2026-6477","CVE-2026-6478","CVE-2026-6479","CVE-2026-6637"],"summary":"postgresql security update","details":"PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you&amp;apos;ll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system.  These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection.  The PostgreSQL server can be found in the postgresql-server sub-package.\r\n\r\nSecurity Fix(es):\n\nMissing authorization in PostgreSQL CREATE TYPE allows an object creator to hijack other queries that use search_path to find user-defined types, including extension-defined types.  That is to say, the victim will execute arbitrary SQL functions of the attacker&apos;s choice.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6472)\n\nInteger wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds.  This may execute arbitrary code as the operating system user running the database.  In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation fault.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6473)\n\nExternally-controlled format string in PostgreSQL timeofday() function allows an attacker to retrieve portions of server memory, via crafted timezone zones.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6474)\n\nSymlink following in PostgreSQL pg_basebackup plain format and in pg_rewind allows an origin superuser to overwrite local files, e.g. /var/lib/postgres/.bashrc, that hijack the operating system account.  It will remain the case that starting the server after these commands implicitly trusts the origin superuser, due to features like shared_preload_libraries.  Hence, the attack has practical implications only if one takes relevant action between these commands and server start, like moving the files to a different VM or snapshotting the VM.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6475)\n\nUse of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response.  Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size.  Because both the \\lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6477)\n\nCovert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate.  This does not affect scram-sha-256 passwords, the default in all supported releases.  However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6478)\n\nUncontrolled recursion in PostgreSQL SSL and GSS negotiation allows an attacker able to connect to a PostgreSQL AF_UNIX socket to achieve sustained denial of service.  If SSL and GSS are both disabled, an attacker can do the same via access to a PostgreSQL TCP socket.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6479)\n\nStack buffer overflow in PostgreSQL module &quot;refint&quot; allows an unprivileged database user to execute arbitrary code as the operating system user running the database.  A distinct attack is possible if the application declares a user-controlled column as a &quot;refint&quot; cascade primary key and facilitates user-controlled updates to that column.  In that case, a SQL injection allows a primary key update value provider to execute arbitrary SQL as the database user performing the primary key update.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6637)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"postgresql","purl":"pkg:rpm/openEuler/postgresql&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"15.18-1.oe2403"}]}],"ecosystem_specific":{"aarch64":["postgresql-15.18-1.oe2403.aarch64.rpm","postgresql-contrib-15.18-1.oe2403.aarch64.rpm","postgresql-debuginfo-15.18-1.oe2403.aarch64.rpm","postgresql-debugsource-15.18-1.oe2403.aarch64.rpm","postgresql-docs-15.18-1.oe2403.aarch64.rpm","postgresql-llvmjit-15.18-1.oe2403.aarch64.rpm","postgresql-plperl-15.18-1.oe2403.aarch64.rpm","postgresql-plpython3-15.18-1.oe2403.aarch64.rpm","postgresql-pltcl-15.18-1.oe2403.aarch64.rpm","postgresql-private-devel-15.18-1.oe2403.aarch64.rpm","postgresql-private-libs-15.18-1.oe2403.aarch64.rpm","postgresql-server-15.18-1.oe2403.aarch64.rpm","postgresql-server-devel-15.18-1.oe2403.aarch64.rpm","postgresql-static-15.18-1.oe2403.aarch64.rpm","postgresql-test-15.18-1.oe2403.aarch64.rpm"],"noarch":["postgresql-test-rpm-macros-15.18-1.oe2403.noarch.rpm"],"src":["postgresql-15.18-1.oe2403.src.rpm"],"x86_64":["postgresql-15.18-1.oe2403.x86_64.rpm","postgresql-contrib-15.18-1.oe2403.x86_64.rpm","postgresql-debuginfo-15.18-1.oe2403.x86_64.rpm","postgresql-debugsource-15.18-1.oe2403.x86_64.rpm","postgresql-docs-15.18-1.oe2403.x86_64.rpm","postgresql-llvmjit-15.18-1.oe2403.x86_64.rpm","postgresql-plperl-15.18-1.oe2403.x86_64.rpm","postgresql-plpython3-15.18-1.oe2403.x86_64.rpm","postgresql-pltcl-15.18-1.oe2403.x86_64.rpm","postgresql-private-devel-15.18-1.oe2403.x86_64.rpm","postgresql-private-libs-15.18-1.oe2403.x86_64.rpm","postgresql-server-15.18-1.oe2403.x86_64.rpm","postgresql-server-devel-15.18-1.oe2403.x86_64.rpm","postgresql-static-15.18-1.oe2403.x86_64.rpm","postgresql-test-15.18-1.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2413"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6472"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6473"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6474"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6477"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6478"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6479"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6637"}],"database_specific":{"severity":"High"}}
