Improper Validation of Specified Type of Input Affecting postgresql:15/postgresql-server-devel package, versions <0:15.17-1.module+el9.4.0+24062+0e16bfab


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.02% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-POSTGRESQL-15572906
  • published15 Mar 2026
  • disclosed12 Feb 2026

Introduced: 12 Feb 2026

CVE-2026-2003  (opens in a new tab)
CWE-1287  (opens in a new tab)

How to fix?

Upgrade RHEL:9 postgresql:15/postgresql-server-devel to version 0:15.17-1.module+el9.4.0+24062+0e16bfab or higher.
This issue was patched in RHSA-2026:4548.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql:15/postgresql-server-devel package and not the postgresql:15/postgresql-server-devel package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

CVSS Base Scores

version 3.1