WID-SEC-W-2026-0409
Vulnerability from csaf_certbund - Published: 2026-02-12 23:00 - Updated: 2026-04-09 22:00Summary
PostgreSQL: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: PostgreSQL ist eine frei verfügbare Datenbank für unterschiedliche Betriebssysteme.
Angriff: Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in PostgreSQL ausnutzen, um Informationen offenzulegen, beliebigen Code auszuführen und nicht näher bezeichnete Angriffe durchzuführen, was möglicherweise zu einer Ausweitung der Berechtigungen führen kann.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "PostgreSQL ist eine frei verf\u00fcgbare Datenbank f\u00fcr unterschiedliche Betriebssysteme.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in PostgreSQL ausnutzen, um Informationen offenzulegen, beliebigen Code auszuf\u00fchren und nicht n\u00e4her bezeichnete Angriffe durchzuf\u00fchren, was m\u00f6glicherweise zu einer Ausweitung der Berechtigungen f\u00fchren kann.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0409 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0409.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0409 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0409"
},
{
"category": "external",
"summary": "PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 Release vom 2026-02-12",
"url": "https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/"
},
{
"category": "external",
"summary": "PostgreSQL Security Advisory CVE-2026-2003 vom 2026-02-12",
"url": "https://www.postgresql.org/support/security/CVE-2026-2003/"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-f3vj-j2m6-8hfj vom 2026-02-12",
"url": "https://github.com/advisories/GHSA-f3vj-j2m6-8hfj"
},
{
"category": "external",
"summary": "Red Hat Bugtracker #2439322 vom 2026-02-12",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439322"
},
{
"category": "external",
"summary": "PostgreSQL Security Advisory CVE-2026-2004 vom 2026-02-12",
"url": "https://www.postgresql.org/support/security/CVE-2026-2004/"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-qw3h-8vxv-jf6c vom 2026-02-12",
"url": "https://github.com/advisories/GHSA-qw3h-8vxv-jf6c"
},
{
"category": "external",
"summary": "Red Hat Bugtracker #2439325 vom 2026-02-12",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439325"
},
{
"category": "external",
"summary": "PostgreSQL Security Advisory CVE-2026-2005 vom 2026-02-12",
"url": "https://www.postgresql.org/support/security/CVE-2026-2005/"
},
{
"category": "external",
"summary": "Red Hat Bugtracker #2439326 vom 2026-02-12",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439326"
},
{
"category": "external",
"summary": "PostgreSQL Security Advisory CVE-2026-2006 vom 2026-02-12",
"url": "https://www.postgresql.org/support/security/CVE-2026-2006/"
},
{
"category": "external",
"summary": "Red Hat Bugtracker #2439324 vom 2026-02-12",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439324"
},
{
"category": "external",
"summary": "PostgreSQL Security Advisory CVE-2026-2007 vom 2026-02-12",
"url": "https://www.postgresql.org/support/security/CVE-2026-2007/"
},
{
"category": "external",
"summary": "Red Hat Bugtracker #2439320 vom 2026-02-12",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439320"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6132 vom 2026-02-12",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00041.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6133 vom 2026-02-12",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00042.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10191-1 vom 2026-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R53OUKSEGWIIMFAAZXYBZUVE5KDE2B57/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10190-1 vom 2026-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IRHTTMYUCNL4VTAVCEDKZMZF74V55WVH/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10192-1 vom 2026-02-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPKEKVHFWO7KZTLMHDJG6RGN4KEOD4EU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0588-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0584-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0585-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0586-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0614-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0616-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0615-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0769-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024548.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0784-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024534.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0785-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024533.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0786-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0787-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024531.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0771-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0770-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0768-1 vom 2026-03-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8072-1 vom 2026-03-04",
"url": "https://ubuntu.com/security/notices/USN-8072-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3730 vom 2026-03-04",
"url": "https://access.redhat.com/errata/RHSA-2026:3730"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3896 vom 2026-03-06",
"url": "https://errata.build.resf.org/RLSA-2026:3896"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20588-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3896 vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3896"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2POSTGRESQL14-2026-022 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2POSTGRESQL14-2026-022.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3730 vom 2026-03-06",
"url": "https://errata.build.resf.org/RLSA-2026:3730"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3887 vom 2026-03-06",
"url": "https://errata.build.resf.org/RLSA-2026:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3887 vom 2026-03-05",
"url": "https://access.redhat.com/errata/RHSA-2026:3887"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20587-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3887 vom 2026-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-3887.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3730 vom 2026-03-06",
"url": "https://linux.oracle.com/errata/ELSA-2026-3730.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4059 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4059"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4024 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4024"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4074 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4074"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4024 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4024.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4063 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4063"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4064 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4064"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4063 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4063.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4075 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4075"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4110 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4110"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4110 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4110.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4024 vom 2026-03-09",
"url": "https://errata.build.resf.org/RLSA-2026:4024"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4059 vom 2026-03-09",
"url": "https://errata.build.resf.org/RLSA-2026:4059"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4063 vom 2026-03-10",
"url": "https://errata.build.resf.org/RLSA-2026:4063"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4064 vom 2026-03-09",
"url": "https://errata.build.resf.org/RLSA-2026:4064"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4110 vom 2026-03-10",
"url": "https://errata.build.resf.org/RLSA-2026:4110"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3896 vom 2026-03-09",
"url": "https://linux.oracle.com/errata/ELSA-2026-3896.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4059 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4059.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4064 vom 2026-03-11",
"url": "http://linux.oracle.com/errata/ELSA-2026-4064.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4254 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4254"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4441 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4441"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4504 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4504"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0883-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4548 vom 2026-03-13",
"url": "https://access.redhat.com/errata/RHSA-2026:4548"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4544 vom 2026-03-13",
"url": "https://access.redhat.com/errata/RHSA-2026:4544"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4546 vom 2026-03-13",
"url": "https://access.redhat.com/errata/RHSA-2026:4546"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4515 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4515"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4516 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4516"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4547 vom 2026-03-13",
"url": "https://access.redhat.com/errata/RHSA-2026:4547"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4518 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4518"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4524 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4524"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4509 vom 2026-03-13",
"url": "https://access.redhat.com/errata/RHSA-2026:4509"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4528 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4528"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4475 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4475"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4505 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4505"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4506 vom 2026-03-12",
"url": "https://access.redhat.com/errata/RHSA-2026:4506"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0881-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0882-1 vom 2026-03-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4943 vom 2026-03-18",
"url": "https://access.redhat.com/errata/RHSA-2026:4943"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2026-3193 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2026-3193.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20388-1 vom 2026-03-25",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WUMTPS5LMSADZWZBWUL6R4RR6L5HD3O/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20921-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20906-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20447-1 vom 2026-04-02",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSWFQL6OS5QQTS7DNGYR6SY6MDRVPL6X/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4524 vom 2026-04-09",
"url": "https://lists.debian.org/debian-lts-announce/2026/04/msg00003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20983-1 vom 2026-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025182.html"
}
],
"source_lang": "en-US",
"title": "PostgreSQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:16:20.818+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0409",
"initial_release_date": "2026-02-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE, Red Hat und Amazon aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat, Oracle Linux und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-04-08T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.2",
"product": {
"name": "Open Source PostgreSQL \u003c18.2",
"product_id": "T050881"
}
},
{
"category": "product_version",
"name": "18.2",
"product": {
"name": "Open Source PostgreSQL 18.2",
"product_id": "T050881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postgresql:postgresql:18.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17.8",
"product": {
"name": "Open Source PostgreSQL \u003c17.8",
"product_id": "T050882"
}
},
{
"category": "product_version",
"name": "17.8",
"product": {
"name": "Open Source PostgreSQL 17.8",
"product_id": "T050882-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postgresql:postgresql:17.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c16.12",
"product": {
"name": "Open Source PostgreSQL \u003c16.12",
"product_id": "T050883"
}
},
{
"category": "product_version",
"name": "16.12",
"product": {
"name": "Open Source PostgreSQL 16.12",
"product_id": "T050883-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postgresql:postgresql:16.12"
}
}
},
{
"category": "product_version_range",
"name": "\u003c15.16",
"product": {
"name": "Open Source PostgreSQL \u003c15.16",
"product_id": "T050884"
}
},
{
"category": "product_version",
"name": "15.16",
"product": {
"name": "Open Source PostgreSQL 15.16",
"product_id": "T050884-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postgresql:postgresql:15.16"
}
}
},
{
"category": "product_version_range",
"name": "\u003c14.21",
"product": {
"name": "Open Source PostgreSQL \u003c14.21",
"product_id": "T050885"
}
},
{
"category": "product_version",
"name": "14.21",
"product": {
"name": "Open Source PostgreSQL 14.21",
"product_id": "T050885-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:postgresql:postgresql:14.21"
}
}
}
],
"category": "product_name",
"name": "PostgreSQL"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-2003",
"product_status": {
"known_affected": [
"67646",
"T050884",
"T050883",
"T050885",
"T004914",
"T032255",
"T050882",
"T050881",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-12T23:00:00.000+00:00",
"title": "CVE-2026-2003"
},
{
"cve": "CVE-2026-2004",
"product_status": {
"known_affected": [
"67646",
"T050884",
"T050883",
"T050885",
"T004914",
"T032255",
"T050882",
"T050881",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-12T23:00:00.000+00:00",
"title": "CVE-2026-2004"
},
{
"cve": "CVE-2026-2005",
"product_status": {
"known_affected": [
"67646",
"T050884",
"T050883",
"T050885",
"T004914",
"T032255",
"T050882",
"T050881",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-12T23:00:00.000+00:00",
"title": "CVE-2026-2005"
},
{
"cve": "CVE-2026-2006",
"product_status": {
"known_affected": [
"67646",
"T050884",
"T050883",
"T050885",
"T004914",
"T032255",
"T050882",
"T050881",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-12T23:00:00.000+00:00",
"title": "CVE-2026-2006"
},
{
"cve": "CVE-2026-2007",
"product_status": {
"known_affected": [
"67646",
"T050884",
"T050883",
"T050885",
"T004914",
"T032255",
"T050882",
"T050881",
"2951",
"T002207",
"T000126",
"T027843",
"398363"
]
},
"release_date": "2026-02-12T23:00:00.000+00:00",
"title": "CVE-2026-2007"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…