Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:4504 - Security Advisory
Issued:
2026-03-12
Updated:
2026-03-12

RHSA-2026:4504 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: postgresql:13 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the postgresql:13 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

PostgreSQL is an advanced object-relational database management system (DBMS).

Security Fix(es):

  • postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code (CVE-2026-2006)
  • postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code (CVE-2026-2004)
  • postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64

Fixes

  • BZ - 2439324 - CVE-2026-2006 postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code
  • BZ - 2439325 - CVE-2026-2004 postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code
  • BZ - 2439326 - CVE-2026-2005 postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code

CVEs

  • CVE-2026-2004
  • CVE-2026-2005
  • CVE-2026-2006

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4

SRPM
pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.src.rpm SHA-256: 69d37c6427f18ed1bd6d29cb2f54e083fb125c162fcb59a687c67528a2fb08e9
postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.src.rpm SHA-256: 1afa4d664011737a91d8efe7f3ba1f1f9bd6c8e7c510d867bbd1ff41832fe95a
postgresql-13.23-1.module+el8.4.0+24060+20ac1283.1.src.rpm SHA-256: 3a565acc645c89dfc4a6f8e68d2888df12ed66de41b661cbb4f8408a79f2a6a1
x86_64
pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 0ee2cdf7b40988a40a70294764149d58ef44f12b69ac85752465444a5b011340
pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: ed444ce541962f85a37cae58466a203788f69a184d7dbeec159d7b424ab0ff8c
pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 3092f6f3bd32f8b30489fed2aad9d9884f77da6872a53d6b183a49b0224e7d91
postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: c2d5f6f1d41fd29098090d75b4927696fc01450d42ae75311c14056e574645c0
postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 7275a1229edefdcf0df138ea35e317fb9143461c6122cb4c8a3ec2821f5e1b65
postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: c7145f0c47def50c037cd2694d408fa03627e7581a1303e8d7ccfb5cf47918e6
postgresql-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: ce0dc66bed64ae929cfe07098cdcd711580fa9be8cd5afeabfe353bf2cfab313
postgresql-contrib-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 0b5e78caf56532907d3d8f49fd76e8220356a5066caf5e440dca021c47eefc51
postgresql-contrib-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: ca42dad9c63bda8707991ed2eae0a042b6a094e32483cbfc5138619f34ad2539
postgresql-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 473e458a8487ef99fe439cd0feb91d36ad1ecdd11691d9f4b9d4db3d6573c051
postgresql-debugsource-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 0588eac4f31bc7c3a0525927c8f7232b2a477fabe1d77a1b201396145c8c6b70
postgresql-docs-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: c80fcbe684f9383f8828551d9cd029b91266896353a931be2259221e133ae47d
postgresql-docs-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: a3b987b31864c9f81ada143cfdf3418bdcdac79b35083e16b7d2213d038cb630
postgresql-plperl-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 065be00e7d347eeb3ea01478d6bfe0a34e2d8697cd184c21b0fdb6143223677e
postgresql-plperl-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: c7b1bdc87bac3838f5b18ed1d7e0f028ae08c746be3db3b38887374b928a4368
postgresql-plpython3-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: bb57311d72d0590e8f253b37ff028e4b96992c02cbc67188b7cfbd86a40be380
postgresql-plpython3-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 6386dbb3719946e3616a0abed9dd7cd0af14cadeffe7f9a199259f5b6e5851da
postgresql-pltcl-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 29e58c6f98ab315436aa81decf3566f5f805acdbbdbc702a90fe21db47ad4958
postgresql-pltcl-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 69a334e6f885e5175688eab10623c2c627019a76999863eef1d0e1fd36ca24af
postgresql-server-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 6ea45dbf3c45ab01c73a83cef6567b956adfa60e254a4eec901647f0deefedb2
postgresql-server-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: e01650f404d556564332f8b6945e80a8e6fa37d210828dc2ae5ca429c022953e
postgresql-server-devel-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 36b550d587c390c4639b877754b98a855842f25a3036a78bcc437c4c52abd569
postgresql-server-devel-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 1b22907f31c6f162510fa5abb3c3128e13c5b6274285b01afef2c6f9ef8fa9ae
postgresql-static-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 5063cdfe4d4e02a7bcef1f7e6d0bc1132194328867c73deea1ace820b0317089
postgresql-test-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 3a5906c36a3c77e1784dd34b165c50ea428ba7408b60269294d577572f448e87
postgresql-test-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 1d2a90cb04645c5f63ac0f185f18221680efb2ff9c1df340f4049e0447753267
postgresql-test-rpm-macros-13.23-1.module+el8.4.0+24060+20ac1283.1.noarch.rpm SHA-256: 09c3f654b5694b1762d623441d5bc40e90094be3d59e9a5f3b22dc4c63d6f70c
postgresql-upgrade-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: e80f1a0d65ed809f2d80f5d1684a80bb1e5221f19ff804bddefda4c88ae39edd
postgresql-upgrade-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 410b627fb20a3e8704e20f7e5407b3d098b1723ec56a17d09db7486ba0ff236b
postgresql-upgrade-devel-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: fcc660a0f7d0cd003950613b388e285070c381100dce40c64d8dfd697e375ec9
postgresql-upgrade-devel-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: d2e3d3d05eee12ac03186aabd0a02ed294653f15a050ca5d1580730f42fffbc4

Red Hat Enterprise Linux Server - AUS 8.4

SRPM
pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.src.rpm SHA-256: 69d37c6427f18ed1bd6d29cb2f54e083fb125c162fcb59a687c67528a2fb08e9
postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.src.rpm SHA-256: 1afa4d664011737a91d8efe7f3ba1f1f9bd6c8e7c510d867bbd1ff41832fe95a
postgresql-13.23-1.module+el8.4.0+24060+20ac1283.1.src.rpm SHA-256: 3a565acc645c89dfc4a6f8e68d2888df12ed66de41b661cbb4f8408a79f2a6a1
x86_64
pgaudit-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 0ee2cdf7b40988a40a70294764149d58ef44f12b69ac85752465444a5b011340
pgaudit-debuginfo-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: ed444ce541962f85a37cae58466a203788f69a184d7dbeec159d7b424ab0ff8c
pgaudit-debugsource-1.5.0-1.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 3092f6f3bd32f8b30489fed2aad9d9884f77da6872a53d6b183a49b0224e7d91
postgres-decoderbufs-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: c2d5f6f1d41fd29098090d75b4927696fc01450d42ae75311c14056e574645c0
postgres-decoderbufs-debuginfo-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: 7275a1229edefdcf0df138ea35e317fb9143461c6122cb4c8a3ec2821f5e1b65
postgres-decoderbufs-debugsource-0.10.0-2.module+el8.4.0+8873+b821c30a.x86_64.rpm SHA-256: c7145f0c47def50c037cd2694d408fa03627e7581a1303e8d7ccfb5cf47918e6
postgresql-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: ce0dc66bed64ae929cfe07098cdcd711580fa9be8cd5afeabfe353bf2cfab313
postgresql-contrib-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 0b5e78caf56532907d3d8f49fd76e8220356a5066caf5e440dca021c47eefc51
postgresql-contrib-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: ca42dad9c63bda8707991ed2eae0a042b6a094e32483cbfc5138619f34ad2539
postgresql-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 473e458a8487ef99fe439cd0feb91d36ad1ecdd11691d9f4b9d4db3d6573c051
postgresql-debugsource-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 0588eac4f31bc7c3a0525927c8f7232b2a477fabe1d77a1b201396145c8c6b70
postgresql-docs-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: c80fcbe684f9383f8828551d9cd029b91266896353a931be2259221e133ae47d
postgresql-docs-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: a3b987b31864c9f81ada143cfdf3418bdcdac79b35083e16b7d2213d038cb630
postgresql-plperl-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 065be00e7d347eeb3ea01478d6bfe0a34e2d8697cd184c21b0fdb6143223677e
postgresql-plperl-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: c7b1bdc87bac3838f5b18ed1d7e0f028ae08c746be3db3b38887374b928a4368
postgresql-plpython3-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: bb57311d72d0590e8f253b37ff028e4b96992c02cbc67188b7cfbd86a40be380
postgresql-plpython3-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 6386dbb3719946e3616a0abed9dd7cd0af14cadeffe7f9a199259f5b6e5851da
postgresql-pltcl-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 29e58c6f98ab315436aa81decf3566f5f805acdbbdbc702a90fe21db47ad4958
postgresql-pltcl-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 69a334e6f885e5175688eab10623c2c627019a76999863eef1d0e1fd36ca24af
postgresql-server-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 6ea45dbf3c45ab01c73a83cef6567b956adfa60e254a4eec901647f0deefedb2
postgresql-server-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: e01650f404d556564332f8b6945e80a8e6fa37d210828dc2ae5ca429c022953e
postgresql-server-devel-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 36b550d587c390c4639b877754b98a855842f25a3036a78bcc437c4c52abd569
postgresql-server-devel-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 1b22907f31c6f162510fa5abb3c3128e13c5b6274285b01afef2c6f9ef8fa9ae
postgresql-static-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 5063cdfe4d4e02a7bcef1f7e6d0bc1132194328867c73deea1ace820b0317089
postgresql-test-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 3a5906c36a3c77e1784dd34b165c50ea428ba7408b60269294d577572f448e87
postgresql-test-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 1d2a90cb04645c5f63ac0f185f18221680efb2ff9c1df340f4049e0447753267
postgresql-test-rpm-macros-13.23-1.module+el8.4.0+24060+20ac1283.1.noarch.rpm SHA-256: 09c3f654b5694b1762d623441d5bc40e90094be3d59e9a5f3b22dc4c63d6f70c
postgresql-upgrade-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: e80f1a0d65ed809f2d80f5d1684a80bb1e5221f19ff804bddefda4c88ae39edd
postgresql-upgrade-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: 410b627fb20a3e8704e20f7e5407b3d098b1723ec56a17d09db7486ba0ff236b
postgresql-upgrade-devel-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: fcc660a0f7d0cd003950613b388e285070c381100dce40c64d8dfd697e375ec9
postgresql-upgrade-devel-debuginfo-13.23-1.module+el8.4.0+24060+20ac1283.1.x86_64.rpm SHA-256: d2e3d3d05eee12ac03186aabd0a02ed294653f15a050ca5d1580730f42fffbc4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility