Security Information

If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org. For reporting non-security bugs, please see the Report a Bug page.

The PostgreSQL Global Development Group (PGDG) takes security seriously, allowing our users to place their trust in the web sites and applications built around PostgreSQL. Our approach covers fail-safe configuration options, a secure and robust database server as well as good integration with other security infrastructure software.

PostgreSQL security updates are primarily made available as minor version upgrades. You are always advised to use the latest minor version available, as it will likely also contain other non-security related fixes. All known security issues are always fixed in the next major release, when it comes out.

PGDG believes that accuracy, completeness and availability of security information is essential for our users. We choose to pool all information on this one page, allowing easy searching for vulnerabilities by a range of criteria.

Vulnerabilities list which major releases they were present in, and which version they are fixed in for each. If the vulnerability was exploitable without a valid login, this is also stated. They also list a vulnerability class, but we urge all users to read the description to determine if the bug affects specific installations or not.

Known security issues in all supported versions

You can filter the view of patches to show just patches for version:
13 - 12 - 11 - 10 - 9.6 - all

Reference Affected Fixed Component & CVSS v3 Base Score Description
CVE-2021-32028
Announcement
13, 12, 11, 10, 9.6 13.3, 12.7, 11.12, 10.17, 9.6.22 core server
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE

more details
CVE-2021-32027
Announcement
13, 12, 11, 10, 9.6 13.3, 12.7, 11.12, 10.17, 9.6.22 core server
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Buffer overrun from integer overflow in array subscripting calculations

more details
CVE-2020-25696
Announcement
13, 12, 11, 10, 9.6, 9.5 13.1, 12.5, 11.10, 10.15, 9.6.20, 9.5.24 client
7.5
AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
psql's \gset allows overwriting specially treated variables

more details
CVE-2020-25695
Announcement
13, 12, 11, 10, 9.6, 9.5 13.1, 12.5, 11.10, 10.15, 9.6.20, 9.5.24 core server
8.8
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Multiple features escape "security restricted operation" sandbox

more details
CVE-2020-25694
Announcement
13, 12, 11, 10, 9.6, 9.5 13.1, 12.5, 11.10, 10.15, 9.6.20, 9.5.24 client
8.1
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Reconnection can downgrade connection security settings

more details
CVE-2020-14350
Announcement
12, 11, 10, 9.6, 9.5 12.4, 11.9, 10.14, 9.6.19, 9.5.23 core server
7.1
AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Uncontrolled search path element in CREATE EXTENSION

more details
CVE-2020-14349
Announcement
12, 11, 10 12.4, 11.9, 10.14 core server
7.5
AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Uncontrolled search path element in logical replication

more details
CVE-2020-10733
Announcement
12, 11, 10, 9.6, 9.5 12.3, 11.8, 10.13, 9.6.18, 9.5.22 packaging
6.7
AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Windows installer runs executables from uncontrolled directories

more details
CVE-2020-1720
Announcement
12, 11, 10, 9.6 12.2, 11.7, 10.12, 9.6.17 core server
3.1
AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
ALTER ... DEPENDS ON EXTENSION is missing authorization checks.

more details
CVE-2019-10211
Announcement
11, 10, 9.6, 9.5, 9.4 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 packaging
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Windows installer bundled OpenSSL executes code from unprotected directory

more details
CVE-2019-10210
Announcement
11, 10, 9.6, 9.5, 9.4 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 packaging
6.7
AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Windows installer writes superuser password to unprotected temporary file

more details
CVE-2019-10208
Announcement
11, 10, 9.6, 9.5, 9.4 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 core server
7.5
AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution

more details
CVE-2019-10164
Announcement
11, 10 11.4, 10.9 core server
7.5
AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Stack-based buffer overflow via setting a password

more details
CVE-2019-10130
Announcement
11, 10, 9.6, 9.5 11.3, 10.8, 9.6.13, 9.5.17 core server
3.1
AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Selectivity estimators bypass row security policies

more details
CVE-2019-10128
Announcement
11, 10, 9.6, 9.5, 9.4 11.3, 10.8, 9.6.13, 9.5.17, 9.4.22 packaging
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EnterpriseDB Windows installer does not clear permissive ACL entries

more details
CVE-2019-10127
Announcement
11, 10, 9.6, 9.5, 9.4 11.3, 10.8, 9.6.13, 9.5.17, 9.4.22 packaging
7.0
AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
BigSQL Windows installer does not clear permissive ACL entries.

more details
CVE-2019-3466
Announcement
12, 11, 10, 9.6, 9.5, 9.4 12.1, 11.6, 10.11, 9.6.16, 9.5.20, 9.4.25 packaging
8.4
AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directories

more details
CVE-2018-16850
Announcement
11, 10 11.1, 10.6 core server
8.8
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.

more details
CVE-2018-10925
Announcement
10, 9.6, 9.5 10.5, 9.6.10, 9.5.14 core server
7.1
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Memory disclosure and missing authorization in INSERT ... ON CONFLICT DO UPDATE.

more details
CVE-2018-10915
Announcement
10, 9.6, 9.5, 9.4, 9.3 10.5, 9.6.10, 9.5.14, 9.4.19, 9.3.24 client
8.5
AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Certain host connection parameters defeat client-side security defenses

more details
CVE-2018-1115
Announcement
10, 9.6 10.4, 9.6.9 contrib module
3.1
AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Too-permissive access control list on function pg_logfile_rotate()

more details
CVE-2018-1058
Announcement
10, 9.6, 9.5, 9.4, 9.3 10.3, 9.6.8, 9.5.12, 9.4.17, 9.3.22 client
8.8
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Uncontrolled search path element in pg_dump and other client applications

more details
CVE-2018-1053
Announcement
10, 9.6, 9.5, 9.4, 9.3 10.2, 9.6.7, 9.5.11, 9.4.16, 9.3.21 client
6.7
AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
pg_upgrade creates file of sensitive metadata under prevailing umask

more details
CVE-2018-1052
Announcement
10 10.2 core server
6.5
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Memory disclosure in table partitioning

more details
CVE-2017-15099
Announcement
10, 9.6, 9.5 10.1, 9.6.6, 9.5.10 core server
3.1
AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges

more details
CVE-2017-15098
Announcement
10, 9.6, 9.5, 9.4, 9.3 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20 core server
4.3
AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Memory disclosure in JSON functions

more details
CVE-2017-12172
Announcement
10, 9.6, 9.5, 9.4, 9.3, 9.2 10.1, 9.6.6, 9.5.10, 9.4.15, 9.3.20, 9.2.24 contrib module
8.4
AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Start scripts permit database administrator to modify root-owned files

more details

Unsupported versions

You can also view archived security patches for unsupported versions. Note that no further security patches are made available for these versions as they are end of life.
9.5 - 9.4 - 9.3 - 9.2 - 9.1 - 9.0 - 8.4 - 8.3 - 8.2 - 8.1 - 8.0 - 7.4 - 7.3

Components

The following component references are used in the above table:

Component Description
core server This vulnerability exists in the core server product.
client This vulnerability exists in a client library or client application only.
contrib module This vulnerability exists in a contrib module. Contrib modules are not installed by default when PostgreSQL is installed from source. They may be installed by binary packages.
client contrib module This vulnerability exists in a contrib module used on the client only.
packaging This vulnerability exists in PostgreSQL binary packaging, e.g. an installer or RPM.