CVE-2026-2003 Affecting postgresql15-plperl package, versions <15.17-150200.5.54.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES154-POSTGRESQL15PLPERL-15371685
  • published4 Mar 2026
  • disclosed3 Mar 2026

Introduced: 3 Mar 2026

NewCVE-2026-2003  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 postgresql15-plperl to version 15.17-150200.5.54.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream postgresql15-plperl package and not the postgresql15-plperl package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.

CVSS Base Scores

version 3.1