{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-6477","assignerOrgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","state":"PUBLISHED","assignerShortName":"PostgreSQL","dateReserved":"2026-04-17T00:44:19.965Z","datePublished":"2026-05-14T13:00:12.497Z","dateUpdated":"2026-05-15T03:56:18.668Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f86ef6dc-4d3a-42ad-8f28-e6d5547a5007","shortName":"PostgreSQL","dateUpdated":"2026-05-14T13:00:12.497Z"},"title":"PostgreSQL libpq lo_* functions let server superuser overwrite client stack memory","descriptions":[{"lang":"en","value":"Use of inherently dangerous function PQfn(..., result_is_int=0, ...) in PostgreSQL libpq lo_export(), lo_read(), lo_lseek64(), and lo_tell64() functions allows the server superuser to overwrite a client stack buffer with an arbitrarily-large response.  Like gets(), PQfn(..., result_is_int=0, ...) stores arbitrary-length, server-determined data into a buffer of unspecified size.  Because both the \\lo_export command in psql and pg_dump call lo_read(), the server superuser can overwrite pg_dump or psql stack memory.  Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected."}],"affected":[{"defaultStatus":"unaffected","product":"PostgreSQL","vendor":"n/a","versions":[{"lessThan":"18.4","status":"affected","version":"18","versionType":"rpm"},{"lessThan":"17.10","status":"affected","version":"17","versionType":"rpm"},{"lessThan":"16.14","status":"affected","version":"16","versionType":"rpm"},{"lessThan":"15.18","status":"affected","version":"15","versionType":"rpm"},{"lessThan":"14.23","status":"affected","version":"0","versionType":"rpm"}]}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-242","type":"CWE","description":"Use of Inherently Dangerous Function"}]}],"references":[{"url":"https://www.postgresql.org/support/security/CVE-2026-6477/"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH"}}],"workarounds":[{"lang":"en","value":"use PQexecPrepared(), not PQfn(..., result_is_int=0, ...) or its lo_* wrappers"}],"credits":[{"lang":"en","value":"The PostgreSQL project thanks Yu Kunpeng and Martin Heistermann for reporting this problem."}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-14T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-6477"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-15T03:56:18.668Z"}}]}}