{"affected":[{"ecosystem_specific":{"binaries":[{"postgresql14":"14.21-160000.1.1","postgresql14-contrib":"14.21-160000.1.1","postgresql14-devel":"14.21-160000.1.1","postgresql14-docs":"14.21-160000.1.1","postgresql14-plperl":"14.21-160000.1.1","postgresql14-plpython":"14.21-160000.1.1","postgresql14-pltcl":"14.21-160000.1.1","postgresql14-server":"14.21-160000.1.1","postgresql14-server-devel":"14.21-160000.1.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 16.0","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Server%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.21-160000.1.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"postgresql14":"14.21-160000.1.1","postgresql14-contrib":"14.21-160000.1.1","postgresql14-devel":"14.21-160000.1.1","postgresql14-docs":"14.21-160000.1.1","postgresql14-plperl":"14.21-160000.1.1","postgresql14-plpython":"14.21-160000.1.1","postgresql14-pltcl":"14.21-160000.1.1","postgresql14-server":"14.21-160000.1.1","postgresql14-server-devel":"14.21-160000.1.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP applications 16.0","name":"postgresql14","purl":"pkg:rpm/suse/postgresql14&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"14.21-160000.1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for postgresql14 fixes the following issues:\n\nUpdate to version 14.21.\n\nSecurity issues fixed:\n\n- CVE-2026-2003: improper validation of type \"oidvector\" may allow disclose a few bytes of server memory (bsc#1258008).\n- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code\n  execution (bsc#1258009).\n- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution\n  (bsc#1258010).\n- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution\n  (bsc#1258011).\n- CVE-2025-12817: missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332).\n- CVE-2025-12818: integer overflow in allocation-size calculations within libpq (bsc#1253333).\n","id":"SUSE-SU-2026:20587-1","modified":"2026-02-20T16:11:55Z","published":"2026-02-20T16:11:55Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620587-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253332"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258010"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258011"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-12817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-12818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2003"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2005"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2006"}],"related":["CVE-2025-12817","CVE-2025-12818","CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"],"summary":"Security update for postgresql14","upstream":["CVE-2025-12817","CVE-2025-12818","CVE-2026-2003","CVE-2026-2004","CVE-2026-2005","CVE-2026-2006"]}