<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for postgresql is now available for openEuler-24.03-LTS-SP3</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2414</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-22</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-22</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-22</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-22</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">postgresql security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for postgresql is now available for openEuler-24.03-LTS-SP3</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you&amp;apos;ll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system.  These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection.  The PostgreSQL server can be found in the postgresql-server sub-package.

Security Fix(es):

Missing authorization in PostgreSQL CREATE TYPE allows an object creator to hijack other queries that use search_path to find user-defined types, including extension-defined types.  That is to say, the victim will execute arbitrary SQL functions of the attacker&apos;s choice.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6472)

Integer wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds.  This may execute arbitrary code as the operating system user running the database.  In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation fault.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6473)

Externally-controlled format string in PostgreSQL timeofday() function allows an attacker to retrieve portions of server memory, via crafted timezone zones.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6474)

Symlink following in PostgreSQL pg_basebackup plain format and in pg_rewind allows an origin superuser to overwrite local files, e.g. /var/lib/postgres/.bashrc, that hijack the operating system account.  It will remain the case that starting the server after these commands implicitly trusts the origin superuser, due to features like shared_preload_libraries.  Hence, the attack has practical implications only if one takes relevant action between these commands and server start, like moving the files to a different VM or snapshotting the VM.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6475)

Use of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response.  Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size.  Because both the \lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6477)

Covert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate.  This does not affect scram-sha-256 passwords, the default in all supported releases.  However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6478)

Uncontrolled recursion in PostgreSQL SSL and GSS negotiation allows an attacker able to connect to a PostgreSQL AF_UNIX socket to achieve sustained denial of service.  If SSL and GSS are both disabled, an attacker can do the same via access to a PostgreSQL TCP socket.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6479)

Stack buffer overflow in PostgreSQL module &quot;refint&quot; allows an unprivileged database user to execute arbitrary code as the operating system user running the database.  A distinct attack is possible if the application declares a user-controlled column as a &quot;refint&quot; cascade primary key and facilitates user-controlled updates to that column.  In that case, a SQL injection allows a primary key update value provider to execute arbitrary SQL as the database user performing the primary key update.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.(CVE-2026-6637)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for postgresql is now available for openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP4/openEuler-24.03-LTS-SP3.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">postgresql</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6472</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6473</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6474</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6475</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6477</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6478</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6479</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-6637</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6472</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6473</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6474</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6475</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6477</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6478</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6479</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-6637</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openEuler-24.03-LTS-SP3</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="postgresql-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-contrib-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-contrib-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-debuginfo-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-debuginfo-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-debugsource-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-debugsource-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-docs-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-docs-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-llvmjit-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-llvmjit-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-plperl-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-plperl-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-plpython3-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-plpython3-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-pltcl-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-pltcl-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-private-devel-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-private-devel-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-private-libs-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-private-libs-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-server-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-server-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-server-devel-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-server-devel-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-static-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-static-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-test-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-test-15.18-1.oe2403sp3.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="postgresql-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-15.18-1.oe2403sp3.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="postgresql-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-contrib-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-contrib-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-debuginfo-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-debuginfo-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-debugsource-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-debugsource-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-docs-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-docs-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-llvmjit-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-llvmjit-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-plperl-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-plperl-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-plpython3-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-plpython3-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-pltcl-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-pltcl-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-private-devel-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-private-devel-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-private-libs-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-private-libs-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-server-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-server-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-server-devel-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-server-devel-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-static-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-static-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="postgresql-test-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-test-15.18-1.oe2403sp3.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="postgresql-test-rpm-macros-15.18-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">postgresql-test-rpm-macros-15.18-1.oe2403sp3.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Missing authorization in PostgreSQL CREATE TYPE allows an object creator to hijack other queries that use search_path to find user-defined types, including extension-defined types.  That is to say, the victim will execute arbitrary SQL functions of the attacker&apos;s choice.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6472</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.4</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds.  This may execute arbitrary code as the operating system user running the database.  In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation fault.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6473</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Externally-controlled format string in PostgreSQL timeofday() function allows an attacker to retrieve portions of server memory, via crafted timezone zones.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6474</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.3</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Symlink following in PostgreSQL pg_basebackup plain format and in pg_rewind allows an origin superuser to overwrite local files, e.g. /var/lib/postgres/.bashrc, that hijack the operating system account.  It will remain the case that starting the server after these commands implicitly trusts the origin superuser, due to features like shared_preload_libraries.  Hence, the attack has practical implications only if one takes relevant action between these commands and server start, like moving the files to a different VM or snapshotting the VM.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6475</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response.  Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size.  Because both the \lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6477</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Covert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate.  This does not affect scram-sha-256 passwords, the default in all supported releases.  However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6478</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uncontrolled recursion in PostgreSQL SSL and GSS negotiation allows an attacker able to connect to a PostgreSQL AF_UNIX socket to achieve sustained denial of service.  If SSL and GSS are both disabled, an attacker can do the same via access to a PostgreSQL TCP socket.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6479</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack buffer overflow in PostgreSQL module &quot;refint&quot; allows an unprivileged database user to execute arbitrary code as the operating system user running the database.  A distinct attack is possible if the application declares a user-controlled column as a &quot;refint&quot; cascade primary key and facilitates user-controlled updates to that column.  In that case, a SQL injection allows a primary key update value provider to execute arbitrary SQL as the database user performing the primary key update.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-6637</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>postgresql security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2414</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>