File _patchinfo of Package patchinfo.42736

<patchinfo incident="42736">
  <issue tracker="bnc" id="1258011">VUL-0: CVE-2026-2006: postgresql: Fix inadequate validation of multibyte character lengths</issue>
  <issue tracker="bnc" id="1258010">VUL-0: CVE-2026-2005: postgresql: Fix buffer overrun in contrib/pgcrypto's PGP decryption functions</issue>
  <issue tracker="bnc" id="1258009">VUL-0: CVE-2026-2004: postgresql: Harden selectivity estimators against being attached to operators that accept unexpected data types</issue>
  <issue tracker="bnc" id="1258008">VUL-0: CVE-2026-2003: postgresql: Guard against unexpected dimensions of oidvector/int2vector</issue>
  <issue tracker="cve" id="2026-2006"/>
  <issue tracker="cve" id="2026-2003"/>
  <issue tracker="cve" id="2026-2005"/>
  <issue tracker="cve" id="2026-2004"/>
  <packager>rmax</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for postgresql17</summary>
  <description>This update for postgresql17 fixes the following issues:

Update to version 17.8.

Security issues fixed:

- CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008).
- CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code
  execution (bsc#1258009).
- CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution
  (bsc#1258010).
- CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution
  (bsc#1258011).
</description>
</patchinfo>
openSUSE Build Service is sponsored by