Description
Duplicate of CVE-2026-32286
Published: 2026-03-19
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: Denial of Service
Action: Update
AI Analysis

Impact

The vulnerability resides in the pgproto3 Go library, which parses PostgreSQL wire protocol messages. A malicious or compromised PostgreSQL server can send a DataRow message that specifies a negative field length. This improper input validation causes a slice bounds out of range panic in the client, resulting in a denial‑of‑service (DoS) condition. The weakness is identified as CWE‑129, an input validation failure that triggers uncontrolled memory or control flow errors.

Affected Systems

The flaw affects a wide range of Red Hat products that incorporate the pgproto3 library: Assisted Installer for Red Hat OpenShift Container Platform 2, Multicluster Engine for Kubernetes, Multicluster Global Hub, Red Hat Advanced Cluster Management for Kubernetes 2, Red Hat Advanced Cluster Security 4, Red Hat Enterprise Linux 8/9/10, Red Hat OpenShift AI (RHOAI), Red Hat OpenShift Cluster Manager CLI, Red Hat OpenShift Container Platform 4, Red Hat OpenShift on AWS, Red Hat Quay 3, and Red Hat Trusted Artifact Signer. Specific affected versions are not listed in the CNA data, so the entire product families are considered potentially impacted.

Risk and Exploitability

The CVSS score is 7.5 (High). EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. The exploit requires a compromised or malicious PostgreSQL server that can communicate with the vulnerable client. The attack vector is therefore a remote network attacker or a malicious server; no local privileges are required. Given the severity and the potential for network‑based exploitation, the overall risk level is high, and remediation is advised even if a patch is not currently released.

Generated by OpenCVE AI on March 19, 2026 at 15:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s security portal or product release notes for an updated version of the pgproto3 library or related Red Hat component.
  • If an update is available, install or upgrade the affected product to the patched version.
  • While awaiting a patch, restrict network connectivity so that only trusted PostgreSQL servers can communicate with the affected clients.
  • Consider implementing firewall rules or ingress policies that block or inspect DataRow messages from untrusted sources.
  • Monitor the system for unexpected panics or restarts that may indicate exploitation attempts.

Generated by OpenCVE AI on March 19, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x6gf-mpr2-68h6 Duplicate Advisory: pgproto3: Negative field length panics in DataRow.Decode
History

Mon, 30 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
Title Github.com/jackc/pgproto3: pgproto3: denial of service via negative field length in datarow message github.com/jackc/pgproto3: pgproto3: Denial of Service via negative field length in DataRow message
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 08:30:00 +0000


Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic. Duplicate of CVE-2026-32286
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:advanced_cluster_security:4
cpe:/a:redhat:assisted_installer:2
cpe:/a:redhat:multicluster_engine
cpe:/a:redhat:multicluster_globalhub
cpe:/a:redhat:openshift:4
cpe:/a:redhat:openshift_ai
cpe:/a:redhat:openshift_cluster_manager_cli:1
cpe:/a:redhat:openshift_service_on_aws:1
cpe:/a:redhat:quay:3
cpe:/a:redhat:trusted_artifact_signer:1
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat acm
Redhat assisted Installer
Redhat openshift
Redhat openshift Service On Aws
Redhat quay

Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat advanced Cluster Management For Kubernetes
Redhat openshift Container Platform
Redhat openshift On Aws
Redhat quay 3
Vendors & Products Redhat advanced Cluster Management For Kubernetes
Redhat openshift Container Platform
Redhat openshift On Aws
Redhat quay 3

Fri, 20 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 19 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic.
Title Github.com/jackc/pgproto3: pgproto3: denial of service via negative field length in datarow message
First Time appeared Redhat
Redhat acm
Redhat advanced Cluster Security
Redhat assisted Installer
Redhat enterprise Linux
Redhat multicluster Engine
Redhat multicluster Globalhub
Redhat openshift
Redhat openshift Ai
Redhat openshift Cluster Manager Cli
Redhat openshift Service On Aws
Redhat quay
Redhat trusted Artifact Signer
Weaknesses CWE-129
CPEs cpe:/a:redhat:acm:2
cpe:/a:redhat:advanced_cluster_security:4
cpe:/a:redhat:assisted_installer:2
cpe:/a:redhat:multicluster_engine
cpe:/a:redhat:multicluster_globalhub
cpe:/a:redhat:openshift:4
cpe:/a:redhat:openshift_ai
cpe:/a:redhat:openshift_cluster_manager_cli:1
cpe:/a:redhat:openshift_service_on_aws:1
cpe:/a:redhat:quay:3
cpe:/a:redhat:trusted_artifact_signer:1
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat acm
Redhat advanced Cluster Security
Redhat assisted Installer
Redhat enterprise Linux
Redhat multicluster Engine
Redhat multicluster Globalhub
Redhat openshift
Redhat openshift Ai
Redhat openshift Cluster Manager Cli
Redhat openshift Service On Aws
Redhat quay
Redhat trusted Artifact Signer
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Redhat Advanced Cluster Management For Kubernetes Advanced Cluster Security Enterprise Linux Multicluster Engine Multicluster Globalhub Openshift Ai Openshift Cluster Manager Cli Openshift Container Platform Openshift On Aws Quay 3 Trusted Artifact Signer
cve-icon MITRE

Status: REJECTED

Assigner: redhat

Published:

Updated: 2026-03-30T07:59:41.848Z

Reserved: 2026-03-19T12:54:24.750Z

Link: CVE-2026-4427

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2026-03-19T15:16:28.710

Modified: 2026-03-30T08:16:18.573

Link: CVE-2026-4427

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-18T13:00:31Z

Links: CVE-2026-4427 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:14:54Z

Weaknesses