If you wish to report a new security vulnerability in PostgreSQL, please send an email to security@postgresql.org. For reporting non-security bugs, please see the Report a Bug page.
The PostgreSQL Global Development Group (PGDG) takes security seriously, allowing our users to place their trust in the web sites and applications built around PostgreSQL. Our approach covers fail-safe configuration options, a secure and robust database server as well as good integration with other security infrastructure software.
PostgreSQL security updates are primarily made available as minor version upgrades. You are always advised to use the latest minor version available, as it will likely also contain other non-security related fixes. All known security issues are always fixed in the next major release, when it comes out.
PGDG believes that accuracy, completeness and availability of security information is essential for our users. We choose to pool all information on this one page, allowing easy searching for vulnerabilities by a range of criteria.
Vulnerabilities list which major releases they were present in, and which version they are fixed in for each. If the vulnerability was exploitable without a valid login, this is also stated. They also list a vulnerability class, but we urge all users to read the description to determine if the bug affects specific installations or not.
You can filter the view of patches to show just patches for version:
13 -
12 -
11 -
10 -
9.6
- all
Reference | Affected | Fixed | Component & CVSS v3 Base Score | Description |
---|---|---|---|---|
Announcement |
11, 12, 13 | 11.11, 12.6, 13.2 | core server 3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
Partition constraint violation errors leak values of denied columns |
Announcement |
9.5, 9.6, 10, 11, 12, 13 | 9.5.24, 9.6.20, 10.15, 11.10, 12.5, 13.1 | client 7.5 AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
psql's \gset allows overwriting specially treated variables |
Announcement |
9.5, 9.6, 10, 11, 12, 13 | 9.5.24, 9.6.20, 10.15, 11.10, 12.5, 13.1 | core server 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Multiple features escape "security restricted operation" sandbox |
Announcement |
9.5, 9.6, 10, 11, 12, 13 | 9.5.24, 9.6.20, 10.15, 11.10, 12.5, 13.1 | client 8.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Reconnection can downgrade connection security settings |
Announcement |
9.5, 9.6, 10, 11, 12 | 9.5.23, 9.6.19, 10.14, 11.9, 12.4 | core server 7.1 AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Uncontrolled search path element in CREATE EXTENSION |
Announcement |
10, 11, 12 | 10.14, 11.9, 12.4 | core server 7.5 AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Uncontrolled search path element in logical replication |
Announcement |
9.5, 9.6, 10, 11, 12 | 9.5.22, 9.6.18, 10.13, 11.8, 12.3 | packaging 6.7 AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Windows installer runs executables from uncontrolled directories |
Announcement |
9.6, 10, 11, 12 | 9.6.17, 10.12, 11.7, 12.2 | core server 3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N |
ALTER ... DEPENDS ON EXTENSION is missing authorization checks. |
Announcement |
9.4, 9.5, 9.6, 10, 11 | 9.4.24, 9.5.19, 9.6.15, 10.10, 11.5 | packaging 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Windows installer bundled OpenSSL executes code from unprotected directory |
Announcement |
9.4, 9.5, 9.6, 10, 11 | 9.4.24, 9.5.19, 9.6.15, 10.10, 11.5 | packaging 6.7 AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Windows installer writes superuser password to unprotected temporary file |
Announcement |
11 | 11.5 | core server 3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
Memory disclosure in cross-type comparison for hashed subplan |
Announcement |
9.4, 9.5, 9.6, 10, 11 | 9.4.24, 9.5.19, 9.6.15, 10.10, 11.5 | core server 7.5 AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution |
Announcement |
10, 11 | 10.9, 11.4 | core server 7.5 AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Stack-based buffer overflow via setting a password |
Announcement |
9.5, 9.6, 10, 11 | 9.5.17, 9.6.13, 10.8, 11.3 | core server 3.1 AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
Selectivity estimators bypass row security policies |
Announcement |
11 | 11.3 | core server 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Memory disclosure in partition routing |
Announcement |
9.4, 9.5, 9.6, 10, 11 | 9.4.22, 9.5.17, 9.6.13, 10.8, 11.3 | packaging 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
EnterpriseDB Windows installer does not clear permissive ACL entries |
Announcement |
9.4, 9.5, 9.6, 10, 11 | 9.4.22, 9.5.17, 9.6.13, 10.8, 11.3 | packaging 7.0 AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
BigSQL Windows installer does not clear permissive ACL entries. |
Announcement |
9.4, 9.5, 9.6, 10, 11, 12 | 9.4.25, 9.5.20, 9.6.16, 10.11, 11.6, 12.1 | packaging 8.4 AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directories |
Announcement |
10, 11 | 10.6, 11.1 | core server 8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING. |
You can also view archived security patches for unsupported versions. Note that no further
security patches are made available for these versions as they are end of life.
9.5 -
9.4 -
9.3 -
9.2 -
9.1 -
9.0 -
8.4 -
8.3 -
8.2 -
8.1 -
8.0 -
7.4 -
7.3
The following component references are used in the above table:
Component | Description |
---|---|
core server | This vulnerability exists in the core server product. |
client | This vulnerability exists in a client library or client application only. |
contrib module | This vulnerability exists in a contrib module. Contrib modules are not installed by default when PostgreSQL is installed from source. They may be installed by binary packages. |
client contrib module | This vulnerability exists in a contrib module used on the client only. |
packaging | This vulnerability exists in PostgreSQL binary packaging, e.g. an installer or RPM. |