Skip to content

fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security]#381

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-github.com-jackc-pgx-v5-vulnerability
Open

fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security]#381
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/go-github.com-jackc-pgx-v5-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Apr 16, 2026

This PR contains the following updates:

Package Change Age Confidence
github.com/jackc/pgx/v5 v5.7.4v5.9.2 age confidence

Memory-safety vulnerability in github.com/jackc/pgx/v5.

CVE-2026-33816 / GHSA-9jj7-4m8r-rfcm

More information

Details

Memory-safety vulnerability in github.com/jackc/pgx/v5.

Severity

  • CVSS Score: 9.8 / 10 (Critical)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


pgx: SQL Injection via placeholder confusion with dollar quoted string literals

CVE-2026-41889 / GHSA-j88v-2chj-qfwx

More information

Details

Impact

SQL Injection can occur when:

  1. The non-default simple protocol is used.
  2. A dollar quoted string literal is used in the SQL query.
  3. That string literal contains text that would be would be interpreted as a placeholder outside of a string literal.
  4. The value of that placeholder is controllable by the attacker.

e.g.

attackValue := `$tag$; drop table canary; --`
_, err = tx.Exec(ctx, `select $tag$ $1 $tag$, $1`, pgx.QueryExecModeSimpleProtocol, attackValue)

This is unlikely to occur outside of a contrived scenario.

Patches

The problem is resolved in v5.9.2.

Workarounds

Do not use the simple protocol to execute queries matching all the above conditions.

Severity

  • CVSS Score: 2.3 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

jackc/pgx (github.com/jackc/pgx/v5)

v5.9.2

Compare Source

v5.9.1

Compare Source

v5.9.0

Compare Source

v5.8.0

Compare Source

v5.7.6

Compare Source

v5.7.5

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot added the dependencies Pull requests that update a dependency file label Apr 16, 2026
@renovate renovate Bot requested review from a team as code owners April 16, 2026 22:53
@renovate
Copy link
Copy Markdown
Contributor Author

renovate Bot commented Apr 16, 2026

ℹ️ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 9 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.0 -> 1.25.0
github.com/stretchr/testify v1.10.0 -> v1.11.1
golang.org/x/crypto v0.37.0 -> v0.41.0
golang.org/x/mod v0.24.0 -> v0.27.0
golang.org/x/net v0.39.0 -> v0.43.0
golang.org/x/sync v0.13.0 -> v0.17.0
golang.org/x/sys v0.32.0 -> v0.35.0
golang.org/x/term v0.31.0 -> v0.34.0
golang.org/x/text v0.24.0 -> v0.29.0
golang.org/x/tools v0.32.0 -> v0.36.0

@renovate renovate Bot added the dependencies Pull requests that update a dependency file label Apr 16, 2026
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.0 [security] fix(deps): update module github.com/jackc/pgx/v5 to v5.9.0 [security] - autoclosed Apr 17, 2026
@renovate renovate Bot closed this Apr 17, 2026
@renovate renovate Bot deleted the renovate/go-github.com-jackc-pgx-v5-vulnerability branch April 17, 2026 09:41
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.0 [security] - autoclosed fix(deps): update module github.com/jackc/pgx/v5 to v5.9.0 [security] Apr 17, 2026
@renovate renovate Bot reopened this Apr 17, 2026
@renovate renovate Bot force-pushed the renovate/go-github.com-jackc-pgx-v5-vulnerability branch 3 times, most recently from e4a429a to 7dce4ac Compare April 23, 2026 00:01
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.0 [security] fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] Apr 23, 2026
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] - autoclosed Apr 27, 2026
@renovate renovate Bot closed this Apr 27, 2026
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] - autoclosed fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] Apr 27, 2026
@renovate renovate Bot reopened this Apr 27, 2026
@renovate renovate Bot force-pushed the renovate/go-github.com-jackc-pgx-v5-vulnerability branch 2 times, most recently from 7dce4ac to e846459 Compare April 27, 2026 22:18
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] - autoclosed May 4, 2026
@renovate renovate Bot closed this May 4, 2026
@renovate renovate Bot changed the title fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] - autoclosed fix(deps): update module github.com/jackc/pgx/v5 to v5.9.2 [security] May 4, 2026
@renovate renovate Bot reopened this May 4, 2026
@renovate renovate Bot force-pushed the renovate/go-github.com-jackc-pgx-v5-vulnerability branch 2 times, most recently from e846459 to ac4cb1d Compare May 4, 2026 15:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants