An integer overflow in the calculated message size of a query or bind message could allow a single large message to be sent as multiple messages under the attacker’s control. This could lead to SQL injection if an attacker can cause a single query or bind message to exceed 4 GB in size.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/jackc/pgx/v5 | ge | 5.0.0 | |
github.com/jackc/pgx/v4 | lt | 4.18.2 | |
github.com/jackc/pgproto3/v2 | lt | 2.3.3 | |
github.com/jackc/pgx/v5 | lt | 5.5.4 |
github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007
github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4
github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8
github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df
github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv