/
DirectorySecurity Advisories
Sign In
Security Advisories

CGA-gjg4-pv8h-r2jm

Published

Last updated

https://images.chainguard.dev/security/CGA-gjg4-pv8h-r2jm
Package

gitlab-cng-fips-17.0

Repository

Chainguard

Latest Update
Under investigation
Aliases
  • GHSA-7jwh-3vrq-q3m8

Severity

Unknown

Summary

pgproto3 SQL Injection via Protocol Message Size Overflow

Description

Impact

SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.

Patches

The problem is resolved in v2.3.3

Workarounds

Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Products

Chainguard ContainersChainguard LibrariesChainguard VMs