Description
Use of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response. Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size. Because both the \lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Published: 2026-05-14
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from PostgreSQL’s libpq function PQfn when used with result_is_int=0, which writes server‑controlled data of arbitrary length into a client buffer without bounds checking. The lo_* wrapper functions such as lo_export, lo_read, lo_lseek64, and lo_tell64 invoke this unsafe routine, allowing a PostgreSQL superuser to deliver a payload that overwrites the caller’s stack memory. The overflowing data can corrupt return addresses or other control‑flow data on the client side, which can lead to denial of service or potentially arbitrary code execution if the overwritten memory is executed. This flaw is analogous to the classic gets() vulnerability in C programs.

Affected Systems

Affected deployments are PostgreSQL database servers using the libpq client library and the provided command‑line utilities psql and pg_dump. Versions of PostgreSQL prior to 18.4, 17.10, 16.14, 15.18, and 14.23 are vulnerable. The flaw affects all OS platforms where these binaries run, as it resides in the client library shared across all hosts communicating with the server.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. Exploitation requires a server superuser and a client that invokes the vulnerable lo_* wrappers. While EPSS data are not available, the absence of a listing in CISA’s KEV catalog suggests that no publicly disclosed exploits have yet been seen, but the flaw is exploitable on any downstream client that has privileged access to the server. Because the payload originates from the server, an attacker who gains superuser status can trigger the corrupting response directly. The lack of mitigation built into the client library makes the vulnerability highly exploitable in environments where servers and clients are co‑located or where trusted administrators are also potential attackers.

Generated by OpenCVE AI on May 14, 2026 at 14:52 UTC.

Remediation

Vendor Workaround

use PQexecPrepared(), not PQfn(..., result_is_int=0, ...) or its lo_* wrappers


OpenCVE Recommended Actions

  • Upgrade to a PostgreSQL release newer than the affected versions – at least 18.4 (or the corresponding later version for each major branch) – which includes the fix for the unsafe PQfn usage in the lo_* helpers.
  • If an immediate upgrade is not possible, replace calls to the dangerous functions with safe alternatives. Specifically, replace PQfn(..., result_is_int=0, ...) and its lo_* wrappers with PQexecPrepared or other parameterized query functions that do not perform unchecked buffer writes.
  • As a temporary containment measure, avoid using the lo_* functions that rely on PQfn; disable large object operations that are not required for the affected clients until a patch is applied.

Generated by OpenCVE AI on May 14, 2026 at 14:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6269-1 postgresql-15 security update
Debian DSA Debian DSA DSA-6270-1 postgresql-17 security update
History

Thu, 14 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Postgresql
Postgresql postgresql
Vendors & Products Postgresql
Postgresql postgresql

Thu, 14 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description Use of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response. Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size. Because both the \lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Title PostgreSQL libpq lo_* functions let server superuser overwrite client stack memory
Weaknesses CWE-242
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Postgresql Postgresql
cve-icon MITRE

Status: PUBLISHED

Assigner: PostgreSQL

Published:

Updated: 2026-05-14T15:32:30.106Z

Reserved: 2026-04-17T00:44:19.965Z

Link: CVE-2026-6477

cve-icon Vulnrichment

Updated: 2026-05-14T15:32:25.888Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T14:16:25.347

Modified: 2026-05-14T16:21:23.190

Link: CVE-2026-6477

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T15:00:12Z

Weaknesses