RHSA-2026:8756
Vulnerability from csaf_redhat - Published: 2026-04-17 12:05 - Updated: 2026-04-20 21:33A flaw was found in PostgreSQL. An improper privilege check during certain RESET ALL operations allows remote authenticated users to remove arbitrary parameter settings via a ALTER USER or ALTER DATABASE statement.
A vulnerability has been identified in PostgreSQL’s CREATE STATISTICS command where the database does not check that the user has the required schema CREATE privilege. A table owner user could create a statistics object in any schema, blocking other users who legitimately hold CREATE STATISTICS permissions from creating objects with the same name. This results in a denial-of-service of the statistics creation functionality.
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.
A type validation flaw has been discovered in postgresql. Improper validation of the type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. It is possible that this may expose confidential information but it is unlikely.
A type validation flaw has been discovered in PostgreSQL. Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.
A heap based buffer overflow flaw has been discovered in PostgreSQL. This Heap buffer overflow is in the `pgcrypto` component and allows a ciphertext provider to execute arbitrary code as the operating system user running the database.
Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.
A heap based buffer overflow has been discovered in postgresql. This heap buffer overflow is in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\npostgresql18:\n * postgresql-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-contrib-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-docs-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-plperl-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-plpython3-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-private-devel-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-private-libs-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-server-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-server-devel-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-static-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-test-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-test-rpm-macros-18.3-1.2.hum1 (noarch)\n * postgresql-upgrade-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql-upgrade-devel-18.3-1.2.hum1 (aarch64, x86_64)\n * postgresql18-18.3-1.2.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8756",
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12818",
"url": "https://access.redhat.com/security/cve/CVE-2025-12818"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12817",
"url": "https://access.redhat.com/security/cve/CVE-2025-12817"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2010-1975",
"url": "https://access.redhat.com/security/cve/CVE-2010-1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2007",
"url": "https://access.redhat.com/security/cve/CVE-2026-2007"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2006",
"url": "https://access.redhat.com/security/cve/CVE-2026-2006"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2005",
"url": "https://access.redhat.com/security/cve/CVE-2026-2005"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2004",
"url": "https://access.redhat.com/security/cve/CVE-2026-2004"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2003",
"url": "https://access.redhat.com/security/cve/CVE-2026-2003"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8756.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-20T21:33:37+00:00",
"generator": {
"date": "2026-04-20T21:33:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8756",
"initial_release_date": "2026-04-17T12:05:00+00:00",
"revision_history": [
{
"date": "2026-04-17T12:05:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-20T11:28:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:33:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql18-main@aarch64",
"product": {
"name": "postgresql18-main@aarch64",
"product_id": "postgresql18-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql@18.3-1.2.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql18-main@x86_64",
"product": {
"name": "postgresql18-main@x86_64",
"product_id": "postgresql18-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql@18.3-1.2.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql18-main@noarch",
"product": {
"name": "postgresql18-main@noarch",
"product_id": "postgresql18-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql-test-rpm-macros@18.3-1.2.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "postgresql18-main@src",
"product": {
"name": "postgresql18-main@src",
"product_id": "postgresql18-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postgresql18@18.3-1.2.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql18-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:postgresql18-main@aarch64"
},
"product_reference": "postgresql18-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql18-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:postgresql18-main@noarch"
},
"product_reference": "postgresql18-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql18-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:postgresql18-main@src"
},
"product_reference": "postgresql18-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql18-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:postgresql18-main@x86_64"
},
"product_reference": "postgresql18-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2010-1975",
"cwe": {
"id": "CWE-264",
"name": "CWE-264"
},
"discovery_date": "2026-04-02T15:00:52.165281+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in PostgreSQL. An improper privilege check during certain RESET ALL operations allows remote authenticated users to remove arbitrary parameter settings via a ALTER USER or ALTER DATABASE statement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: improper privilege check during certain RESET ALL operations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-1975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1975"
},
{
"category": "external",
"summary": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
},
{
"category": "external",
"summary": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2",
"url": "http://marc.info/?l=bugtraq\u0026m=134124585221119\u0026w=2"
},
{
"category": "external",
"summary": "http://secunia.com/advisories/39939",
"url": "http://secunia.com/advisories/39939"
},
{
"category": "external",
"summary": "http://www.debian.org/security/2010/dsa-2051",
"url": "http://www.debian.org/security/2010/dsa-2051"
},
{
"category": "external",
"summary": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:103",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:103"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-7-4-29.html",
"url": "http://www.postgresql.org/docs/current/static/release-7-4-29.html"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-8-0-25.html",
"url": "http://www.postgresql.org/docs/current/static/release-8-0-25.html"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-8-1-21.html",
"url": "http://www.postgresql.org/docs/current/static/release-8-1-21.html"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-8-2-17.html",
"url": "http://www.postgresql.org/docs/current/static/release-8-2-17.html"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-8-3-11.html",
"url": "http://www.postgresql.org/docs/current/static/release-8-3-11.html"
},
{
"category": "external",
"summary": "http://www.postgresql.org/docs/current/static/release-8-4-4.html",
"url": "http://www.postgresql.org/docs/current/static/release-8-4-4.html"
},
{
"category": "external",
"summary": "http://www.securityfocus.com/bid/40304",
"url": "http://www.securityfocus.com/bid/40304"
},
{
"category": "external",
"summary": "http://www.vupen.com/english/advisories/2010/1207",
"url": "http://www.vupen.com/english/advisories/2010/1207"
},
{
"category": "external",
"summary": "http://www.vupen.com/english/advisories/2010/1221",
"url": "http://www.vupen.com/english/advisories/2010/1221"
},
{
"category": "external",
"summary": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11004",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11004"
}
],
"release_date": "2010-05-19T18:13:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "postgresql: improper privilege check during certain RESET ALL operations"
},
{
"cve": "CVE-2025-12817",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2025-11-13T14:01:19.495111+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414825"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in PostgreSQL\u2019s CREATE STATISTICS command where the database does not check that the user has the required schema CREATE privilege. A table owner user could create a statistics object in any schema, blocking other users who legitimately hold CREATE STATISTICS permissions from creating objects with the same name. This results in a denial-of-service of the statistics creation functionality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: CREATE STATISTICS does not check for schema CREATE privilege",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated Low severity by Red Hat Product Security, because exploitation is straightforward once an attacker already holds table-owner privileges. The attack complexity is Low, as no unusual conditions, timing requirements, or unpredictable states are needed; a table owner can simply choose any schema name and intentionally create a statistics object with a conflicting name, which is only trivial to perform and does not require prior knowledge beyond selecting an arbitrary identifier. The availability impact remains Low, since only the creation of a specific statistics object is blocked and normal database operations continue without disruption. There is no confidentiality or integrity impact, and the flaw does not allow privilege escalation. For these reasons, despite a Medium-range CVSS score, the overall impact to Red Hat products is considered Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12817"
},
{
"category": "external",
"summary": "RHBZ#2414825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12817"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2025-12817/",
"url": "https://www.postgresql.org/support/security/CVE-2025-12817/"
}
],
"release_date": "2025-11-13T13:00:12.160000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "postgresql: CREATE STATISTICS does not check for schema CREATE privilege"
},
{
"cve": "CVE-2025-12818",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-13T14:01:22.870197+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414826"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in PostgreSQL\u2019s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: libpq: libpq undersizes allocations, via integer wraparound",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated Moderate severity by Red Hat Product Security, even though it carries a High CVSS v3.1 score. The flaw resides in the libpq client library and can be triggered when a client receives specially crafted PostgreSQL protocol data that causes an integer wraparound and an out-of-bounds write. The attack complexity is Low because the malformed protocol message is processed immediately during connection, with no timing or environmental conditions required. However, the impact is limited to a denial of service of the client application only. As a result, Red Hat classifies the overall product impact as Moderate, reflecting that the flaw can interrupt client availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12818"
},
{
"category": "external",
"summary": "RHBZ#2414826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414826"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12818"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2025-12818/",
"url": "https://www.postgresql.org/support/security/CVE-2025-12818/"
}
],
"release_date": "2025-11-13T13:00:12.911000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "postgresql: libpq: libpq undersizes allocations, via integer wraparound"
},
{
"cve": "CVE-2026-2003",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-02-12T14:01:21.557882+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439322"
}
],
"notes": [
{
"category": "description",
"text": "A type validation flaw has been discovered in postgresql. Improper validation of the type \"oidvector\" in PostgreSQL allows a database user to disclose a few bytes of server memory. It is possible that this may expose confidential information but it is unlikely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: PostgreSQL oidvector discloses a few bytes of memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2003"
},
{
"category": "external",
"summary": "RHBZ#2439322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439322"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2003",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2003"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2026-2003/",
"url": "https://www.postgresql.org/support/security/CVE-2026-2003/"
}
],
"release_date": "2026-02-12T13:00:06.108000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "postgresql: PostgreSQL oidvector discloses a few bytes of memory"
},
{
"cve": "CVE-2026-2004",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-02-12T14:01:31.249026+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439325"
}
],
"notes": [
{
"category": "description",
"text": "A type validation flaw has been discovered in PostgreSQL. Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2004"
},
{
"category": "external",
"summary": "RHBZ#2439325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439325"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2004"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2026-2004/",
"url": "https://www.postgresql.org/support/security/CVE-2026-2004/"
}
],
"release_date": "2026-02-12T13:00:08.857000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code"
},
{
"cve": "CVE-2026-2005",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-02-12T14:01:34.491431+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439326"
}
],
"notes": [
{
"category": "description",
"text": "A heap based buffer overflow flaw has been discovered in PostgreSQL. This Heap buffer overflow is in the `pgcrypto` component and allows a ciphertext provider to execute arbitrary code as the operating system user running the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2005"
},
{
"category": "external",
"summary": "RHBZ#2439326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2005"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2026-2005/",
"url": "https://www.postgresql.org/support/security/CVE-2026-2005/"
}
],
"release_date": "2026-02-12T13:00:09.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code"
},
{
"cve": "CVE-2026-2006",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2026-02-12T14:01:27.485498+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439324"
}
],
"notes": [
{
"category": "description",
"text": "Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2006"
},
{
"category": "external",
"summary": "RHBZ#2439324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2006",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2006"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2026-2006/",
"url": "https://www.postgresql.org/support/security/CVE-2026-2006/"
}
],
"release_date": "2026-02-12T13:00:10.490000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code"
},
{
"cve": "CVE-2026-2007",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-02-12T14:01:16.168111+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2439320"
}
],
"notes": [
{
"category": "description",
"text": "A heap based buffer overflow has been discovered in postgresql. This heap buffer overflow is in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "postgresql: PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"known_not_affected": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2007"
},
{
"category": "external",
"summary": "RHBZ#2439320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439320"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2007"
},
{
"category": "external",
"summary": "https://www.postgresql.org/support/security/CVE-2026-2007/",
"url": "https://www.postgresql.org/support/security/CVE-2026-2007/"
}
],
"release_date": "2026-02-12T13:00:11.127000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T12:05:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8756"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:postgresql18-main@aarch64",
"Red Hat Hardened Images:postgresql18-main@noarch",
"Red Hat Hardened Images:postgresql18-main@src",
"Red Hat Hardened Images:postgresql18-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "postgresql: PostgreSQL pg_trgm heap buffer overflow writes pattern onto server memory"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.