The PostgreSQL Global Development Group has released security updates for versions 18.4, 17.10, 16.14, 15.18, and 14.23, addressing 11 vulnerabilities, including critical issues related to arbitrary code execution and SQL injection flaws. All supported branches from 14 through 18 are affected by vulnerabilities, necessitating updates. Database administrators can perform in-place upgrades without needing a dump/restore.
Key vulnerabilities include:
- CVE-2026-6637: Stack buffer overflow in the refint module allowing arbitrary code execution.
- CVE-2026-6472: Privilege bypass and arbitrary SQL execution.
- CVE-2026-6473: Potential remote code execution and memory corruption.
- CVE-2026-6474: Server memory information leak.
- CVE-2026-6475: Arbitrary file overwrite vulnerability.
- CVE-2026-6476: SQL injection with superuser execution.
- CVE-2026-6477: Client-side code execution risk.
- CVE-2026-6478: MD5 credential timing leak.
- CVE-2026-6479: SSL/GSS denial-of-service flaw.
- CVE-2026-6575: Limited memory disclosure issue.
- CVE-2026-6638: SQL injection in logical replication.
Organizations using PostgreSQL 14 should upgrade to version 14.23 and plan migration to a newer version before the end-of-life on November 12, 2026. The updates are urgent for deployments exposed to the internet or in multi-tenant environments.