CVE-2026-6478
Public on 2026-05-14
Modified on 2026-05-15
Description
Covert timing channel in comparison of MD5-hashed password in PostgreSQL authentication allows an attacker to recover user credentials sufficient to authenticate. This does not affect scram-sha-256 passwords, the default in all supported releases. However, current databases may have MD5-hashed passwords originating in upgrades from PostgreSQL 13 or earlier. Versions before PostgreSQL 18.4, 17.10, 16.14, 15.18, and 14.23 are affected.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 2 - Postgresql14 Extra | libpq | Pending Fix | ||
| Amazon Linux 2023 | libpq | Pending Fix | ||
| Amazon Linux 2 - Core | postgresql | Pending Fix | ||
| Amazon Linux 2 - Postgresql14 Extra | postgresql | Pending Fix | ||
| Amazon Linux 2023 | postgresql15 | Pending Fix | ||
| Amazon Linux 2023 | postgresql16 | Pending Fix | ||
| Amazon Linux 2023 | postgresql17 | Pending Fix | ||
| Amazon Linux 2023 | postgresql18 | Pending Fix |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |