The analysis of the vulnerability was based on the detailed information provided in the GitHub issues, particularly https://github.com/jackc/pgx/issues/2507 and https://github.com/golang/vulndb/issues/4518. These issues clearly identify the vulnerable function as DataRow.Decode in the file data_row.go of the github.com/jackc/pgproto3/v2 package. The issue descriptions provide a detailed root cause analysis, including the exact lines of code that are vulnerable. The vulnerability is caused by improper validation of a length field read from the network, which can be a negative value. This negative value bypasses a length check and causes a panic in a subsequent slicing operation, leading to a denial of service. Although no direct fixing commit was found, the evidence from the issues is conclusive and sufficient to identify the vulnerable function with high confidence.