Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2455972
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh112 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
Migrated Products
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2455972
(
CVE-2026-33816
) -
CVE-2026-33816
github.com/jackc/pgx/v5/pgproto3: github.com/jackc/pgx: Memory-safety vulnerability
Summary:
CVE-2026-33816 github.com/jackc/pgx/v5/pgproto3: github.com/jackc/pgx: Memory...
Keywords
:
Security
Status
:
NEW
Alias:
CVE-2026-33816
Product:
Security Response
Classification:
Other
Component:
vulnerability
Sub Component:
---
Version:
unspecified
Hardware:
All
OS:
Linux
Priority:
high
Severity:
high
Target Milestone:
---
Assignee:
Product Security DevOps Team
QA Contact:
Docs Contact:
URL:
Whiteboard:
Depends On:
2456292
2456294
2456296
2456298
2456300
2456302
2456306
2456293
2456304
Blocks:
TreeView+
depends on
/
blocked
Reported:
2026-04-07 16:01 UTC by
OSIDB Bzimport
Modified:
2026-04-07 23:27 UTC (
History
)
CC List:
36 users
(
show
)
aazores
akostadi
alcohan
amasferr
amctagga
aoconnor
bdettelb
bniver
cmah
dmayorov
doconnor
eaguilar
ebaron
eborisov
flucifre
gmeno
gparvin
groman
jbalunas
jkoehler
jlledo
jolong
lball
lphiri
manissin
mbenjamin
mhackett
ngough
pahickey
pantinor
pjindal
rhaigner
sostapov
tsedmik
vereddy
veshanka
Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:
Attachments
(Terms of Use)
Description
OSIDB Bzimport
2026-04-07 16:01:37 UTC
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Note
You need to
log in
before you can comment on or make changes to this bug.