PostgreSQL Security Update Advisory

PostgreSQL Security Update Advisory

Overview

 

We have released a security update to address a vulnerability in PostgreSQL. Users of affected products are advised to update to the latest version.
 

 

Affected Products

 

CVE-2026-2004, CVE-2026-2005, CVE-2026-2006

 

PostgreSQL versions: 18.2 and earlier
PostgreSQL versions: 17.8 and earlier
PostgreSQL versions: 16.12 and earlier
PostgreSQL versions: 15.16 and earlier
PostgreSQL versions: 14.21 and earlier

 

CVE-2026-2007

 

PostgreSQL Version: 18.1
PostgreSQL version: 18.0

 

 

Resolved Vulnerabilities

 

Arbitrary code execution vulnerability due to missing input type validation in the selectivity estimator function in the PostgreSQL intarray extension module (CVE-2026-2004)
Arbitrary code execution vulnerability due to a heap buffer overflow in pgcrypto in PostgreSQL (CVE-2026-2005)
Arbitrary code execution vulnerability due to missing multibyte character length validation in PostgreSQL (CVE-2026-2006)
Heap buffer overflow vulnerability in pg_trgm in PostgreSQL (CVE-2026-2007)

 

 

Vulnerability Patches

Vulnerability patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2026-2004, CVE-2026-2005, CVE-2026-2006

 

PostgreSQL version: 18.2
PostgreSQL version: 17.8
PostgreSQL version: 16.12
PostgreSQL version: 15.16
PostgreSQL version: 14.21

 

CVE-2026-2007

 

PostgreSQL version: 18.2

 

 

References

 

[1] CVE-2026-2004
https://www.postgresql.org/support/security/CVE-2026-2004/
[2] CVE-2026-2005
https://www.postgresql.org/support/security/CVE-2026-2005/
[3] CVE-2026-2006
https://www.postgresql.org/support/security/CVE-2026-2006/
[4] CVE-2026-2007
https://www.postgresql.org/support/security/CVE-2026-2007/