UBUNTU-CVE-2024-27289

Source
https://ubuntu.com/security/CVE-2024-27289
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27289.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-27289
Related
Published
2024-03-06T19:15:00Z
Modified
2024-10-15T14:14:03Z
Summary
[none]
Details

pgx is a PostgreSQL driver and toolkit for Go. Prior to version 4.18.2, SQL injection can occur when all of the following conditions are met: the non-default simple protocol is used; a placeholder for a numeric value must be immediately preceded by a minus; there must be a second placeholder for a string value after the first placeholder; both must be on the same line; and both parameter values must be user-controlled. The problem is resolved in v4.18.2. As a workaround, do not use the simple protocol or do not place a minus directly before a placeholder.

References

Affected packages

Ubuntu:22.04:LTS / golang-github-jackc-pgx

Package

Name
golang-github-jackc-pgx
Purl
pkg:deb/ubuntu/golang-github-jackc-pgx?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6.2-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.10 / golang-github-jackc-pgx

Package

Name
golang-github-jackc-pgx
Purl
pkg:deb/ubuntu/golang-github-jackc-pgx?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.18.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / golang-github-jackc-pgx

Package

Name
golang-github-jackc-pgx
Purl
pkg:deb/ubuntu/golang-github-jackc-pgx?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.15.0-4
4.18.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}