FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2026-02-13 18:05:15 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e3afc190-0821-11f1-a857-6cc21735f730PostgreSQL -- Multiple vulnerabilities

The PostgreSQL project reports:

Improper validation of type oidvector in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.


Discovery 2026-02-12
Entry 2026-02-12
postgresql14-server
< 14.21

postgresql15-server
< 15.16

postgresql16-server
< 16.12

postgresql17-server
< 17.8

postgresql18-server
< 18.2

postgresql14-server
< 14.21

CVE-2026-2003
CVE-2026-2004
CVE-2026-2005
CVE-2026-2006
CVE-2026-2007
https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/
e3afc190-0821-11f1-a857-6cc21735f730PostgreSQL -- Multiple vulnerabilities

The PostgreSQL project reports:

Improper validation of type oidvector in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.

Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.

Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database.

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.


Discovery 2026-02-12
Entry 2026-02-12
postgresql14-server
< 14.21

postgresql15-server
< 15.16

postgresql16-server
< 16.12

postgresql17-server
< 17.8

postgresql18-server
< 18.2

postgresql14-server
< 14.21

CVE-2026-2003
CVE-2026-2004
CVE-2026-2005
CVE-2026-2006
CVE-2026-2007
https://www.postgresql.org/about/news/postgresql-182-178-1612-1516-and-1421-released-3235/