CVE-2026-2007

NameCVE-2026-2007
DescriptionHeap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
postgresql-13 (PTS)bullseye13.16-0+deb11u1fixed
bullseye (security)13.23-0+deb11u1fixed
postgresql-15 (PTS)bookworm15.15-0+deb12u1fixed
bookworm (security)15.16-0+deb12u1fixed
postgresql-17 (PTS)trixie17.7-0+deb13u1fixed
trixie (security)17.8-0+deb13u1fixed
postgresql-18 (PTS)forky, sid18.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
postgresql-13source(unstable)(not affected)
postgresql-15source(unstable)(not affected)
postgresql-17source(unstable)(not affected)
postgresql-18source(unstable)18.2-1

Notes

- postgresql-17 <not-affected> (Vulnerable code not present)
- postgresql-15 <not-affected> (Vulnerable code not present)
- postgresql-13 <not-affected> (Vulnerable code not present)
https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/
Fixed by: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=18548681da38b2376d0c071d568b9d0c1f8b6ad2 (REL_18_2)
Fixed by: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=e0965fb1a8550716db08e2183560be3546851647 (REL_18_2)

Search for package or bug name: Reporting problems