Security update for postgresql18
| Announcement ID: | SUSE-SU-2026:1946-1 |
|---|---|
| Release Date: | 2026-05-18T07:49:01Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 11 vulnerabilities, contains one feature and has one security fix can now be installed.
Description:
This update for postgresql18 fixes the following issues
Update to version 18.4.
Security issues:
- CVE-2026-6472: ensure the user has CREATE privilege on the schema specified (bsc#1265172).
- CVE-2026-6473: integer overflows in memory-allocation calculations (bsc#1265173).
- CVE-2026-6474: Guard against malicious time zone names (bsc#1265174).
- CVE-2026-6475: Prevent path traversal in pg_basebackup and pg_rewind (bsc#1265175).
- CVE-2026-6476: Properly quote subscription names in pg_createsubscriber (bsc#1265176).
- CVE-2026-6477: Mark PQfn() as unsafe, and avoid using it within libpq (bsc#1265177).
- CVE-2026-6478: Use timing-safe string comparisons in authentication code (bsc#1265178).
- CVE-2026-6479: Prevent unbounded recursion while processing startup packets (bsc#1265179).
- CVE-2026-6575: Detect faulty input when restoring attribute MCV statistics (bsc#1265180).
- CVE-2026-6637: Prevent SQL injection and buffer overruns in contrib/spi (bsc#1265181).
- CVE-2026-6638: Properly quote object names in logical replication origin checks (bsc#1265182).
Non security issue:
- Get rid of update-alternatives for openSUSE/SLE 16.0 and newer to support immutable systems and transactional updates (jsc#PED-14820).
- /usr/bin/pg_config is missing after migrating away from update-alternatives (bsc#1263804).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1946=1 -
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1946=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- libecpg6-debuginfo-18.4-8.12.1
- libpq5-18.4-8.12.1
- libpq5-debuginfo-18.4-8.12.1
- libecpg6-18.4-8.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
- libpq5-debuginfo-32bit-18.4-8.12.1
- libecpg6-32bit-18.4-8.12.1
- libpq5-32bit-18.4-8.12.1
- libecpg6-debuginfo-32bit-18.4-8.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- libpq5-18.4-8.12.1
- libecpg6-18.4-8.12.1
- libpq5-debuginfo-18.4-8.12.1
- libecpg6-debuginfo-32bit-18.4-8.12.1
- libpq5-32bit-18.4-8.12.1
- libpq5-debuginfo-32bit-18.4-8.12.1
- libecpg6-debuginfo-18.4-8.12.1
- libecpg6-32bit-18.4-8.12.1
References:
- https://www.suse.com/security/cve/CVE-2026-6472.html
- https://www.suse.com/security/cve/CVE-2026-6473.html
- https://www.suse.com/security/cve/CVE-2026-6474.html
- https://www.suse.com/security/cve/CVE-2026-6475.html
- https://www.suse.com/security/cve/CVE-2026-6476.html
- https://www.suse.com/security/cve/CVE-2026-6477.html
- https://www.suse.com/security/cve/CVE-2026-6478.html
- https://www.suse.com/security/cve/CVE-2026-6479.html
- https://www.suse.com/security/cve/CVE-2026-6575.html
- https://www.suse.com/security/cve/CVE-2026-6637.html
- https://www.suse.com/security/cve/CVE-2026-6638.html
- https://bugzilla.suse.com/show_bug.cgi?id=1263804
- https://bugzilla.suse.com/show_bug.cgi?id=1265172
- https://bugzilla.suse.com/show_bug.cgi?id=1265173
- https://bugzilla.suse.com/show_bug.cgi?id=1265174
- https://bugzilla.suse.com/show_bug.cgi?id=1265175
- https://bugzilla.suse.com/show_bug.cgi?id=1265176
- https://bugzilla.suse.com/show_bug.cgi?id=1265177
- https://bugzilla.suse.com/show_bug.cgi?id=1265178
- https://bugzilla.suse.com/show_bug.cgi?id=1265179
- https://bugzilla.suse.com/show_bug.cgi?id=1265180
- https://bugzilla.suse.com/show_bug.cgi?id=1265181
- https://bugzilla.suse.com/show_bug.cgi?id=1265182
- https://jira.suse.com/browse/PED-14820