{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql16-contrib":"16.13-150600.16.30.1","postgresql16-devel":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Legacy 15 SP7","name":"postgresql16","purl":"pkg:rpm/suse/postgresql16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql16-llvmjit":"16.13-150600.16.30.1","postgresql16-llvmjit-devel":"16.13-150600.16.30.1","postgresql16-test":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"postgresql16","purl":"pkg:rpm/suse/postgresql16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql16":"16.13-150600.16.30.1","postgresql16-server":"16.13-150600.16.30.1","postgresql16-server-devel":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP7","name":"postgresql16","purl":"pkg:rpm/suse/postgresql16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql16":"16.13-150600.16.30.1","postgresql16-contrib":"16.13-150600.16.30.1","postgresql16-devel":"16.13-150600.16.30.1","postgresql16-docs":"16.13-150600.16.30.1","postgresql16-plperl":"16.13-150600.16.30.1","postgresql16-plpython":"16.13-150600.16.30.1","postgresql16-pltcl":"16.13-150600.16.30.1","postgresql16-server":"16.13-150600.16.30.1","postgresql16-server-devel":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP6-LTSS","name":"postgresql16","purl":"pkg:rpm/suse/postgresql16&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql16":"16.13-150600.16.30.1","postgresql16-contrib":"16.13-150600.16.30.1","postgresql16-devel":"16.13-150600.16.30.1","postgresql16-docs":"16.13-150600.16.30.1","postgresql16-plperl":"16.13-150600.16.30.1","postgresql16-plpython":"16.13-150600.16.30.1","postgresql16-pltcl":"16.13-150600.16.30.1","postgresql16-server":"16.13-150600.16.30.1","postgresql16-server-devel":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP6","name":"postgresql16","purl":"pkg:rpm/suse/postgresql16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql16":"16.13-150600.16.30.1","postgresql16-contrib":"16.13-150600.16.30.1","postgresql16-devel":"16.13-150600.16.30.1","postgresql16-docs":"16.13-150600.16.30.1","postgresql16-llvmjit":"16.13-150600.16.30.1","postgresql16-llvmjit-devel":"16.13-150600.16.30.1","postgresql16-plperl":"16.13-150600.16.30.1","postgresql16-plpython":"16.13-150600.16.30.1","postgresql16-pltcl":"16.13-150600.16.30.1","postgresql16-server":"16.13-150600.16.30.1","postgresql16-server-devel":"16.13-150600.16.30.1","postgresql16-test":"16.13-150600.16.30.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"postgresql16","purl":"pkg:rpm/opensuse/postgresql16&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"16.13-150600.16.30.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql16 fixes the following issues:\n\nUpdate to version 16.13 (bsc#1258754).\n\nSecurity issues fixed:\n\n- CVE-2026-2003: improper validation of type 'oidvector' may allow disclose a few bytes of server memory (bsc#1258008).\n- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code\n  execution (bsc#1258009).\n- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution\n  (bsc#1258010).\n- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution\n  (bsc#1258011).\n    \nRegression fixes:\n\n  - the substring() function raises an error 'invalid byte sequence for encoding' on non-ASCII text values if the\n    source of that value is a database column (caused by CVE-2026-2006 fix).\n  - a standby may halt and return an error 'could not access status of transaction'.\n","id":"SUSE-SU-2026:0882-1","modified":"2026-03-12T10:19:26Z","published":"2026-03-12T10:19:26Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260882-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258011"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258754"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2006"}],"related":["CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"],"summary":"Security update for postgresql16","upstream":["CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"]}