CVE-2026-6665

NameCVE-2026-6665
DescriptionThe SCRAM code in PgBouncer before 1.25.2 did not check the return value of strlcat() correctly when building the contents of the SCRAM client-final-message. A malicious backend that sends a SCRAM server-final-message with a long nonce can trigger a stack overflow.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1136075

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pgbouncer (PTS)bullseye1.15.0-1vulnerable
bullseye (security)1.15.0-1+deb11u2vulnerable
bookworm1.18.0-1+deb12u1vulnerable
trixie1.24.1-1+deb13u1vulnerable
forky, sid1.25.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pgbouncersource(unstable)(unfixed)1136075

Notes

Fixed by: https://github.com/pgbouncer/pgbouncer/commit/ab8dbb3b1a73b4a195062546e5e4f964b79f5b45 (pgbouncer_1_25_2)

Search for package or bug name: Reporting problems