Ubuntu 22.04 LTS / 24.04 LTS / 25.10 / 26.04 LTS : PostgreSQL vulnerabilities (USN-8294-1)

high Nessus Plugin ID 316495

Synopsis

The remote Ubuntu host is missing one or more security updates.

Description

The remote Ubuntu 22.04 LTS / 24.04 LTS / 25.10 / 26.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8294-1 advisory.

It was discovered that PostgreSQL did not correctly enforce authorization for CREATE TYPE. An attacker could possibly use this issue to execute arbitrary SQL functions. (CVE-2026-6472)

It was discovered that PostgreSQL incorrectly handled large user input in multiple server features. An attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-6473)

It was discovered that PostgreSQL incorrectly handled format strings in the timeofday() function. An attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6474)

It was discovered that PostgreSQL incorrectly followed symbolic links in pg_basebackup and pg_rewind. An attacker could possibly use this issue to overwrite local files and execute arbitrary code.
(CVE-2026-6475)

It was discovered that PostgreSQL had an SQL injection vulnerability in pg_createsubscriber. An attacker could possibly use this issue to execute arbitrary SQL as a superuser. This issue only affected Ubuntu 25.10 and Ubuntu 26.04 LTS. (CVE-2026-6476)

It was discovered that PostgreSQL used an unsafe libpq function in large object operations. An attacker could possibly use this issue to overwrite client memory and execute arbitrary code. (CVE-2026-6477)

It was discovered that PostgreSQL did not compare MD5-hashed passwords in constant time. An attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6478)

It was discovered that PostgreSQL had uncontrolled recursion during SSL and GSS negotiation. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-6479)

It was discovered that PostgreSQL incorrectly handled array length mismatches in pg_restore_attribute_stats(). An attacker could possibly use this issue to obtain sensitive information.
This issue only affected Ubuntu 26.04 LTS. (CVE-2026-6575)

It was discovered that PostgreSQL had a stack buffer overflow in the refint module. An attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-6637)

It was discovered that PostgreSQL had an SQL injection vulnerability in logical replication REFRESH PUBLICATION. An attacker could possibly use this issue to execute arbitrary SQL. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-6638)

Tenable has extracted the preceding description block directly from the Ubuntu security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://ubuntu.com/security/notices/USN-8294-1

Plugin Details

Severity: High

ID: 316495

File Name: ubuntu_USN-8294-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/22/2026

Updated: 5/22/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2026-6638

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:postgresql-client-14, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:postgresql-18-jit, p-cpe:/a:canonical:ubuntu_linux:postgresql-server-dev-17, cpe:/o:canonical:ubuntu_linux:25.10, p-cpe:/a:canonical:ubuntu_linux:postgresql-pltcl-18, p-cpe:/a:canonical:ubuntu_linux:postgresql-14, p-cpe:/a:canonical:ubuntu_linux:postgresql-client-16, p-cpe:/a:canonical:ubuntu_linux:postgresql-16, p-cpe:/a:canonical:ubuntu_linux:postgresql-plperl-16, p-cpe:/a:canonical:ubuntu_linux:libecpg-compat3, p-cpe:/a:canonical:ubuntu_linux:postgresql-18, p-cpe:/a:canonical:ubuntu_linux:postgresql-plpython3-18, p-cpe:/a:canonical:ubuntu_linux:libecpg6, p-cpe:/a:canonical:ubuntu_linux:postgresql-plperl-17, p-cpe:/a:canonical:ubuntu_linux:libpgtypes3, p-cpe:/a:canonical:ubuntu_linux:postgresql-pltcl-14, p-cpe:/a:canonical:ubuntu_linux:libpq5, p-cpe:/a:canonical:ubuntu_linux:postgresql-plpython3-14, p-cpe:/a:canonical:ubuntu_linux:libpq-dev, p-cpe:/a:canonical:ubuntu_linux:postgresql-pltcl-17, p-cpe:/a:canonical:ubuntu_linux:postgresql-client-17, p-cpe:/a:canonical:ubuntu_linux:postgresql-17, cpe:/o:canonical:ubuntu_linux:26.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:postgresql-server-dev-16, p-cpe:/a:canonical:ubuntu_linux:postgresql-server-dev-18, p-cpe:/a:canonical:ubuntu_linux:postgresql-plpython3-16, p-cpe:/a:canonical:ubuntu_linux:postgresql-plpython3-17, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:postgresql-pltcl-16, p-cpe:/a:canonical:ubuntu_linux:postgresql-server-dev-14, p-cpe:/a:canonical:ubuntu_linux:postgresql-client-18, p-cpe:/a:canonical:ubuntu_linux:postgresql-plperl-14, p-cpe:/a:canonical:ubuntu_linux:libecpg-dev, p-cpe:/a:canonical:ubuntu_linux:libpq-oauth, p-cpe:/a:canonical:ubuntu_linux:postgresql-plperl-18

Required KB Items: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release

Exploit Ease: No known exploits are available

Patch Publication Date: 5/21/2026

Vulnerability Publication Date: 5/14/2026

Reference Information

CVE: CVE-2026-6472, CVE-2026-6473, CVE-2026-6474, CVE-2026-6475, CVE-2026-6476, CVE-2026-6477, CVE-2026-6478, CVE-2026-6479, CVE-2026-6575, CVE-2026-6637, CVE-2026-6638

USN: 8294-1