Bug 2268269 (CVE-2024-27304) - CVE-2024-27304 pgx: SQL Injection via Protocol Message Size Overflow
Summary: CVE-2024-27304 pgx: SQL Injection via Protocol Message Size Overflow
Keywords:
Status: NEW
Alias: CVE-2024-27304
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2268276 2268278 2268279 2268280 2268281 2268282 2268283 2268284 2268275
Blocks: 2268287
TreeView+ depends on / blocked
 
Reported: 2024-03-06 20:43 UTC by Pedro Sampaio
Modified: 2024-04-17 14:30 UTC (History)
63 users (show)

Fixed In Version: pgx 4.18.2, pgx 5.5.4, pgproto3 2.3.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:1321 0 None None None 2024-03-13 20:55:49 UTC

Description Pedro Sampaio 2024-03-06 20:43:43 UTC
pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

References:

https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007
https://github.com/jackc/pgproto3/security/advisories/GHSA-7jwh-3vrq-q3m8
https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4
https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8
https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df
https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv

Comment 5 Pedro Sampaio 2024-03-06 21:36:48 UTC
Created caddy tracking bugs for this issue:

Affects: epel-all [bug 2268279]
Affects: fedora-all [bug 2268278]


Created golang-github-jackc-pgproto3 tracking bugs for this issue:

Affects: fedora-all [bug 2268283]


Created golang-github-jackc-pgx tracking bugs for this issue:

Affects: fedora-all [bug 2268280]


Created golang-github-jackc-pgx-3 tracking bugs for this issue:

Affects: fedora-all [bug 2268284]


Created migrate tracking bugs for this issue:

Affects: fedora-all [bug 2268281]


Created osbuild-composer tracking bugs for this issue:

Affects: fedora-all [bug 2268282]

Comment 10 errata-xmlrpc 2024-03-13 20:55:45 UTC
This issue has been addressed in the following products:

  Red Hat Advanced Cluster Security 4.3

Via RHSA-2024:1321 https://access.redhat.com/errata/RHSA-2024:1321


Note You need to log in before you can comment on or make changes to this bug.