March 19, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

PostgreSQL Releases Critical Security Update Addressing Remote Code Execution Vulnerabilities

PostgreSQL Releases Critical Security Update Addressing Remote Code Execution Vulnerabilities



PostgreSQL Releases Critical Security Update Addressing Remote Code Execution Vulnerabilities

The PostgreSQL Global Development Group issued security updates across all supported versions on February 12, 2026, addressing five security vulnerabilities that could allow attackers to execute arbitrary code on database servers. Database administrators are urged to update immediately.


Affected Versions and Updates

The security release includes updates for all currently supported PostgreSQL versions:

  • PostgreSQL 18.2 (from 18.0-18.1)
  • PostgreSQL 17.8 (from earlier 17.x versions)
  • PostgreSQL 16.12 (from earlier 16.x versions)
  • PostgreSQL 15.16 (from earlier 15.x versions)
  • PostgreSQL 14.21 (from earlier 14.x versions)

This release addresses five security vulnerabilities and over 65 bugs reported in recent months.


Critical Security Vulnerabilities

The update patches three high-severity vulnerabilities rated 8.8 on the CVSS 3.1 scale, each capable of enabling arbitrary code execution:

CVE-2026-2004: intarray Extension Vulnerability (CVSS 8.8)

A missing validation flaw in the intarray extension’s selectivity estimator allows attackers who can create database objects to execute arbitrary code with the privileges of the database server’s operating system user.

CVE-2026-2005: pgcrypto Buffer Overflow (CVSS 8.8)

A heap buffer overflow in the pgcrypto extension enables attackers to execute arbitrary code by providing specially crafted ciphertext. This vulnerability affects all versions from PostgreSQL 14 through 18.

CVE-2026-2006: Multibyte Character Validation Flaw (CVSS 8.8)

Missing validation of multibyte character lengths allows database users to craft queries that trigger buffer overruns, potentially leading to arbitrary code execution as the database server user.

CVE-2026-2007: pg_trgm Buffer Overflow (CVSS 8.2)

A heap buffer overflow in the pg_trgm extension affects PostgreSQL 18.0 and 18.1. While attackers have limited control over the written byte patterns, privilege escalation attacks remain possible.

CVE-2026-2003: Memory Disclosure (CVSS 4.3)

Improper validation of the oidvector type allows database users to disclose a small amount of server memory. While the PostgreSQL project considers attacks involving confidential information unlikely, they have not been completely ruled out.

PostgreSQL Releases Critical Security Update Addressing Remote Code Execution Vulnerabilities

 


Security Researchers Acknowledged

The PostgreSQL project credited multiple security researchers for responsibly disclosing these vulnerabilities:

  • Altan Birler (CVE-2026-2003)
  • Daniel Firer, part of zeroday.cloud (CVE-2026-2004)
  • Team Xint Code, part of zeroday.cloud (CVE-2026-2005)
  • Paul Gerste and Moritz Sanft, part of zeroday.cloud (CVE-2026-2006)
  • Heikki Linnakangas (CVE-2026-2007)

Key Bug Fixes

Beyond security patches, the release resolves over 65 bugs affecting daily operations:

  • ltree extension: Fixed inconsistent case-insensitive text matching that could corrupt index lookups
  • NOT NULL constraints: Corrected the behavior when adding NOT NULL constraints to already-constrained columns
  • Incremental backups: Fixed handling for tables larger than 1 GB
  • Parallel queries: Restored PL/pgSQL’s ability to use parallel execution
  • B-tree indexes: Prevented rare scenarios where indexes could modify incorrect entries

Upgrade Procedure

PostgreSQL minor releases are cumulative, meaning administrators can upgrade directly to the latest version without intermediate steps. The process is straightforward:

  1. Stop the PostgreSQL service cleanly
  2. Replace binaries with the updated version
  3. Restart the database server
  4. For users with ltree indexes using non-libc collation providers, run REINDEX INDEX CONCURRENTLY on affected indexes

No dump and restore or pg_upgrade is required for this minor version update. Database administrators who have skipped previous releases should review the release notes for any additional post-upgrade steps.

Urgent Recommendation

Security experts emphasize the critical nature of these vulnerabilities. The three remote code execution flaws pose significant risks to production databases, as they could allow attackers to gain complete control of database servers.

“Skipping this minor release leaves critical attack surfaces open while offering little upside,” noted one security analysis. Organizations running PostgreSQL in production environments should prioritize this update in their maintenance schedules.

Download and Additional Information

Updated PostgreSQL packages are available from the official PostgreSQL website at postgresql.org/download. The database system supports Windows (64-bit only), macOS, Linux, BSD, and Solaris operating systems.

Detailed release notes for each version, including comprehensive bug fix lists and migration guidance, are available at postgresql.org/docs/release.

Database administrators can subscribe to the pgsql-announce mailing list to receive notifications about future security releases and other critical announcements from the PostgreSQL project.


PostgreSQL is a powerful, open-source object-relational database system with over 35 years of active development. It is used by organizations worldwide for mission-critical applications requiring reliability, feature robustness, and performance.

PostgreSQL Releases Critical Security Update Addressing Remote Code Execution Vulnerabilities


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.