FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

PostgreSQL -- Multiple vulnerabilities

Affected packages
postgresql14-server < 14.21
postgresql15-server < 15.16
postgresql16-server < 16.12
postgresql17-server < 17.8
postgresql18-server < 18.2
postgresql14-server < 14.21

Details

VuXML ID e3afc190-0821-11f1-a857-6cc21735f730
Discovery 2026-02-12
Entry 2026-02-12

The PostgreSQL project reports:

Improper validation of type oidvector in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.

References

CVE Name CVE-2026-2003
CVE Name CVE-2026-2004
CVE Name CVE-2026-2005
CVE Name CVE-2026-2006
CVE Name CVE-2026-2007
URL https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/