UBUNTU-CVE-2026-2007

Source
https://ubuntu.com/security/CVE-2026-2007
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2007.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-2007
Upstream
Published
2026-02-12T14:16:00Z
Modified
2026-02-18T17:31:18Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.

References

Affected packages

Ubuntu:Pro:14.04:LTS / postgresql-9.3

Package

Name
postgresql-9.3
Purl
pkg:deb/ubuntu/postgresql-9.3@9.3.24-0ubuntu0.14.04+esm1?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*
9.3.1-1
9.3.2-1
9.3.2-1ubuntu1
9.3.2-1ubuntu2
9.3.3-1
9.3.3-1bzr1
9.3.3-1bzr2
9.3.4-1
9.3.5-0ubuntu0.14.04.1
9.3.6-0ubuntu0.14.04
9.3.7-0ubuntu0.14.04
9.3.8-0ubuntu0.4.04
9.3.9-0ubuntu0.14.04
9.3.10-0ubuntu0.14.04
9.3.11-0ubuntu0.14.04
9.3.12-0ubuntu0.14.04
9.3.13-0ubuntu0.14.04
9.3.14-0ubuntu0.14.04
9.3.15-0ubuntu0.14.04
9.3.16-0ubuntu0.14.04
9.3.17-0ubuntu0.14.04
9.3.18-0ubuntu0.14.04.1
9.3.19-0ubuntu0.14.04
9.3.20-0ubuntu0.14.04
9.3.21-0ubuntu0.14.04
9.3.22-0ubuntu0.14.04
9.3.23-0ubuntu0.14.04
9.3.24-0ubuntu0.14.04
9.3.24-0ubuntu0.14.04+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libecpg-compat3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "libecpg-dev",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "libecpg6",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "libpgtypes3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "libpq-dev",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "libpq5",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-client-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-contrib-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-doc-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-plperl-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-plpython-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-plpython3-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-pltcl-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        },
        {
            "binary_name": "postgresql-server-dev-9.3",
            "binary_version": "9.3.24-0ubuntu0.14.04+esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-2007.json"