PostgreSQL has released versions 18.4, 17.10, 16.14, 15.18, and 14.23 to address 11 security vulnerabilities and over 60 bugs. The vulnerabilities affect PostgreSQL versions 14 through 18 and include issues such as remote code execution, SQL injection, and denial-of-service risks. Specific vulnerabilities include:
- CVE-2026-6472: Missing authorization in CREATE TYPE allows query hijacking.
- CVE-2026-6473: Integer wraparound leads to out-of-bounds writes and server crashes.
- CVE-2026-6474: Format string issue leaks server memory.
- CVE-2026-6475: Symlink attack allows overwriting arbitrary files.
- CVE-2026-6476: SQL injection allows execution of arbitrary SQL as superuser.
- CVE-2026-6477: Memory buffer overwrite via libpq lo_* functions.
- CVE-2026-6478: Timing attack exposes MD5-hashed passwords.
- CVE-2026-6479: SSL/GSS recursion flaw allows denial-of-service.
- CVE-2026-6575: Buffer over-read leaks memory data (PostgreSQL 18 only).
- CVE-2026-6637: Refint module enables stack overflow and SQL injection, leading to possible RCE.
- CVE-2026-6638: SQL injection in REFRESH PUBLICATION via table names.
Organizations are advised to upgrade to the latest versions, avoid MD5 password authentication, restrict privileges, audit extensions, and monitor for abnormal activity. PostgreSQL 14 will reach its end-of-life on November 12, 2026.