Description
Uncontrolled recursion in PostgreSQL SSL and GSS negotiation allows an attacker able to connect to a PostgreSQL AF_UNIX socket to achieve sustained denial of service. If SSL and GSS are both disabled, an attacker can do the same via access to a PostgreSQL TCP socket. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Published: 2026-05-14
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability results from uncontrolled recursion during the initialization of SSL or GSS negotiation in PostgreSQL, a flaw classified as CWE‑674. An attacker who can connect to a PostgreSQL socket—either the Unix domain socket exposed via AF_UNIX or the TCP port when both SSL and GSS are disabled—can trigger the recursion and exhaust server resources, causing the database service to become unresponsive. The effect is a denial of service that can be sustained as long as the malicious connections continue.

Affected Systems

The flaw affects PostgreSQL servers, specifically all releases prior to 18.4, 17.10, 16.14, 15.18, and 14.23. Any installation of PostgreSQL that exposes a local AF_UNIX socket or listens on a TCP socket without SSL/GSS enabled is at risk. The issue is present in the core PostgreSQL product.

Risk and Exploitability

The CVSS score of 7.5 indicates a high impact and moderate to high complexity, though the EPSS score is unavailable at this time. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploitation has been recorded yet. Attackers need the ability to open a connection to the database socket, which could be local or network based depending on configuration, making the attack survivable in typical deployment scenarios. Once the recursion is triggered, the database becomes unresponsive until the service is restarted, producing repeatable denial of service.

Generated by OpenCVE AI on May 14, 2026 at 14:51 UTC.

Remediation

Vendor Workaround

enable SSL and/or GSS; disable unix_socket_directories


OpenCVE Recommended Actions

  • Upgrade PostgreSQL to a version no earlier than 18.4, 17.10, 16.14, 15.18, or 14.23 to apply the vendor fix.
  • If upgrading is not immediately possible, enable SSL or GSS authentication to mitigate the recursion loop during socket initialization.
  • Disable or restrict use of unix_socket_directories where feasible to reduce the attack surface for local socket access.
  • Configure firewall or access controls to limit who can reach the database port or Unix socket, reducing the likelihood that an attacker can establish the destructive connection.

Generated by OpenCVE AI on May 14, 2026 at 14:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6269-1 postgresql-15 security update
Debian DSA Debian DSA DSA-6270-1 postgresql-17 security update
History

Thu, 14 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Postgresql
Postgresql postgresql
Vendors & Products Postgresql
Postgresql postgresql

Thu, 14 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled recursion in PostgreSQL SSL and GSS negotiation allows an attacker able to connect to a PostgreSQL AF_UNIX socket to achieve sustained denial of service. If SSL and GSS are both disabled, an attacker can do the same via access to a PostgreSQL TCP socket. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Title PostgreSQL SSL/GSS init causes denial of service, via uncontrolled recursion
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Postgresql Postgresql
cve-icon MITRE

Status: PUBLISHED

Assigner: PostgreSQL

Published:

Updated: 2026-05-14T15:26:20.166Z

Reserved: 2026-04-17T00:45:37.869Z

Link: CVE-2026-6479

cve-icon Vulnrichment

Updated: 2026-05-14T15:26:16.660Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T14:16:25.583

Modified: 2026-05-14T16:21:23.190

Link: CVE-2026-6479

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T16:00:14Z

Weaknesses