{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql14":"14.22-150600.16.28.1","postgresql14-contrib":"14.22-150600.16.28.1","postgresql14-devel":"14.22-150600.16.28.1","postgresql14-docs":"14.22-150600.16.28.1","postgresql14-plperl":"14.22-150600.16.28.1","postgresql14-plpython":"14.22-150600.16.28.1","postgresql14-pltcl":"14.22-150600.16.28.1","postgresql14-server":"14.22-150600.16.28.1","postgresql14-server-devel":"14.22-150600.16.28.1","postgresql14-test":"14.22-150600.16.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP7","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.22-150600.16.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14-llvmjit":"14.22-150600.16.28.1","postgresql14-test":"14.22-150600.16.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.22-150600.16.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14":"14.22-150600.16.28.1","postgresql14-contrib":"14.22-150600.16.28.1","postgresql14-devel":"14.22-150600.16.28.1","postgresql14-docs":"14.22-150600.16.28.1","postgresql14-plperl":"14.22-150600.16.28.1","postgresql14-plpython":"14.22-150600.16.28.1","postgresql14-pltcl":"14.22-150600.16.28.1","postgresql14-server":"14.22-150600.16.28.1","postgresql14-server-devel":"14.22-150600.16.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP6-LTSS","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.22-150600.16.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14":"14.22-150600.16.28.1","postgresql14-contrib":"14.22-150600.16.28.1","postgresql14-devel":"14.22-150600.16.28.1","postgresql14-docs":"14.22-150600.16.28.1","postgresql14-plperl":"14.22-150600.16.28.1","postgresql14-plpython":"14.22-150600.16.28.1","postgresql14-pltcl":"14.22-150600.16.28.1","postgresql14-server":"14.22-150600.16.28.1","postgresql14-server-devel":"14.22-150600.16.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP6","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.22-150600.16.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14":"14.22-150600.16.28.1","postgresql14-contrib":"14.22-150600.16.28.1","postgresql14-devel":"14.22-150600.16.28.1","postgresql14-docs":"14.22-150600.16.28.1","postgresql14-llvmjit":"14.22-150600.16.28.1","postgresql14-llvmjit-devel":"14.22-150600.16.28.1","postgresql14-plperl":"14.22-150600.16.28.1","postgresql14-plpython":"14.22-150600.16.28.1","postgresql14-pltcl":"14.22-150600.16.28.1","postgresql14-server":"14.22-150600.16.28.1","postgresql14-server-devel":"14.22-150600.16.28.1","postgresql14-test":"14.22-150600.16.28.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"postgresql14","purl":"pkg:rpm/opensuse/postgresql14&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.22-150600.16.28.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql14 fixes the following issues:\n\nUpdate to version 14.22 (bsc#1258754).\n\nSecurity issues fixed:\n\n- CVE-2026-2003: improper validation of type 'oidvector' may allow disclose a few bytes of server memory (bsc#1258008).\n- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code\n  execution (bsc#1258009).\n- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution\n  (bsc#1258010).\n- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution\n  (bsc#1258011).\n    \nRegression fixes:\n\n  - the substring() function raises an error 'invalid byte sequence for encoding' on non-ASCII text values if the\n    source of that value is a database column (caused by CVE-2026-2006 fix).\n  - a standby may halt and return an error 'could not access status of transaction'.\n","id":"SUSE-SU-2026:0786-1","modified":"2026-03-03T14:47:10Z","published":"2026-03-03T14:47:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260786-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2006"}],"related":["CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"],"summary":"Security update for postgresql14","upstream":["CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"]}