A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic.
Subscriptions
| Vendors | Products |
|---|---|
|
Redhat
Subscribe
|
Acm
Subscribe
Advanced Cluster Security
Subscribe
Assisted Installer
Subscribe
Enterprise Linux
Subscribe
Multicluster Engine
Subscribe
Multicluster Globalhub
Subscribe
Openshift
Subscribe
Openshift Ai
Subscribe
Openshift Cluster Manager Cli
Subscribe
Openshift Service On Aws
Subscribe
Quay
Subscribe
Trusted Artifact Signer
Subscribe
|
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Mar 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic. | |
| Title | Github.com/jackc/pgproto3: pgproto3: denial of service via negative field length in datarow message | |
| First Time appeared |
Redhat
Redhat acm Redhat advanced Cluster Security Redhat assisted Installer Redhat enterprise Linux Redhat multicluster Engine Redhat multicluster Globalhub Redhat openshift Redhat openshift Ai Redhat openshift Cluster Manager Cli Redhat openshift Service On Aws Redhat quay Redhat trusted Artifact Signer |
|
| Weaknesses | CWE-129 | |
| CPEs | cpe:/a:redhat:acm:2 cpe:/a:redhat:advanced_cluster_security:4 cpe:/a:redhat:assisted_installer:2 cpe:/a:redhat:multicluster_engine cpe:/a:redhat:multicluster_globalhub cpe:/a:redhat:openshift:4 cpe:/a:redhat:openshift_ai cpe:/a:redhat:openshift_cluster_manager_cli:1 cpe:/a:redhat:openshift_service_on_aws:1 cpe:/a:redhat:quay:3 cpe:/a:redhat:trusted_artifact_signer:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat acm Redhat advanced Cluster Security Redhat assisted Installer Redhat enterprise Linux Redhat multicluster Engine Redhat multicluster Globalhub Redhat openshift Redhat openshift Ai Redhat openshift Cluster Manager Cli Redhat openshift Service On Aws Redhat quay Redhat trusted Artifact Signer |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-19T14:24:02.864Z
Reserved: 2026-03-19T12:54:24.750Z
Link: CVE-2026-4427
No data.
Status : Received
Published: 2026-03-19T15:16:28.710
Modified: 2026-03-19T15:16:28.710
Link: CVE-2026-4427
No data.
OpenCVE Enrichment
No data.
Weaknesses