CVE-2026-6478

Public on 2026-05-14
Modified on 2026-05-15
Description
Covert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate. This does not affect scram-sha-256 passwords, the default in all supported releases. However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Severity
Medium severity
Medium
See what this means
CVSS v3 Base Score
5.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Postgresql14 Extra libpq Pending Fix
Amazon Linux 2023 libpq Pending Fix
Amazon Linux 2 - Core postgresql Pending Fix
Amazon Linux 2 - Postgresql14 Extra postgresql Pending Fix
Amazon Linux 2023 postgresql15 Pending Fix
Amazon Linux 2023 postgresql16 Pending Fix
Amazon Linux 2023 postgresql17 Pending Fix
Amazon Linux 2023 postgresql18 Pending Fix

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N