| Name | CVE-2026-2007 |
| Description | Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| postgresql-13 (PTS) | bullseye | 13.16-0+deb11u1 | fixed |
| bullseye (security) | 13.23-0+deb11u1 | fixed | |
| postgresql-15 (PTS) | bookworm | 15.15-0+deb12u1 | fixed |
| bookworm (security) | 15.16-0+deb12u1 | fixed | |
| postgresql-17 (PTS) | trixie | 17.7-0+deb13u1 | fixed |
| trixie (security) | 17.8-0+deb13u1 | fixed | |
| postgresql-18 (PTS) | forky, sid | 18.3-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| postgresql-13 | source | (unstable) | (not affected) | |||
| postgresql-15 | source | (unstable) | (not affected) | |||
| postgresql-17 | source | (unstable) | (not affected) | |||
| postgresql-18 | source | (unstable) | 18.2-1 |
- postgresql-17 <not-affected> (Vulnerable code not present)
- postgresql-15 <not-affected> (Vulnerable code not present)
- postgresql-13 <not-affected> (Vulnerable code not present)
https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/
Fixed by: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=18548681da38b2376d0c071d568b9d0c1f8b6ad2 (REL_18_2)
Fixed by: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;h=e0965fb1a8550716db08e2183560be3546851647 (REL_18_2)