Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Critical Security Flaw in Red Hat PostgreSQL Database
RHSA-2026:4064
Summary
A severe security issue was found in PostgreSQL database software used by Red Hat systems. This flaw could allow an attacker to execute malicious code on a database server, potentially leading to data theft or disruption. Red Hat has released an update to fix this issue, which you should apply to your systems as soon as possible.
What to do
- Update redhat pg_repack to version 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf.
- Update redhat pg_repack-debuginfo to version 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf.
- Update redhat pg_repack-debugsource to version 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf.
- Update redhat pgaudit to version 0:1.4.0-7.module+el8.10.0+22214+9beb89d6.
- Update redhat pgaudit-debuginfo to version 0:1.4.0-7.module+el8.10.0+22214+9beb89d6.
- Update redhat pgaudit-debugsource to version 0:1.4.0-7.module+el8.10.0+22214+9beb89d6.
- Update redhat postgres-decoderbufs to version 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf.
- Update redhat postgres-decoderbufs-debuginfo to version 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf.
- Update redhat postgres-decoderbufs-debugsource to version 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf.
- Update redhat postgresql to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-contrib to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-contrib-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-debugsource to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-docs to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-docs-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-plperl to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-plperl-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-plpython3 to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-plpython3-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-pltcl to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-pltcl-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-server to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-server-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-server-devel to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-server-devel-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-static to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-test to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-test-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-test-rpm-macros to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-upgrade to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-upgrade-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-upgrade-devel to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
- Update redhat postgresql-upgrade-devel-debuginfo to version 0:12.22-6.module+el8.10.0+24045+2b30545f.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | pg_repack | <= 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf | 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf |
| redhat | pg_repack-debuginfo | <= 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf | 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf |
| redhat | pg_repack-debugsource | <= 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf | 0:1.4.6-3.module+el8.9.0+19330+c97ddbdf |
| redhat | pgaudit | <= 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 | 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 |
| redhat | pgaudit-debuginfo | <= 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 | 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 |
| redhat | pgaudit-debugsource | <= 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 | 0:1.4.0-7.module+el8.10.0+22214+9beb89d6 |
| redhat | postgres-decoderbufs | <= 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf | 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf |
| redhat | postgres-decoderbufs-debuginfo | <= 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf | 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf |
| redhat | postgres-decoderbufs-debugsource | <= 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf | 0:0.10.0-2.module+el8.9.0+19330+c97ddbdf |
| redhat | postgresql | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-contrib | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-contrib-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-debugsource | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-docs | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-docs-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-plperl | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-plperl-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-plpython3 | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-plpython3-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-pltcl | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-pltcl-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-server | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-server-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-server-devel | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-server-devel-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-static | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-test | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-test-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-test-rpm-macros | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-upgrade | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-upgrade-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-upgrade-devel | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
| redhat | postgresql-upgrade-devel-debuginfo | <= 0:12.22-6.module+el8.10.0+24045+2b30545f | 0:12.22-6.module+el8.10.0+24045+2b30545f |
Original title
Red Hat Security Advisory: postgresql:12 security update
osv CVSS3.1
8.8
- https://access.redhat.com/errata/RHSA-2026:4064 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439324 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439325 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2439326 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4064.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-2004 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-2004 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-2004 Vendor Advisory
- https://www.postgresql.org/support/security/CVE-2026-2004/ Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-2005 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-2005 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-2005 Vendor Advisory
- https://www.postgresql.org/support/security/CVE-2026-2005/ Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-2006 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-2006 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-2006 Vendor Advisory
- https://www.postgresql.org/support/security/CVE-2026-2006/ Third Party Advisory
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026