CVE-2024-27304
ADVISORY - githubSummary
Impact
SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.
Patches
The problem is resolved in v4.18.2 and v5.5.4.
Workarounds
Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.
Common Weakness Enumeration (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
NIST
CVSS SCORE
9.8criticalGitHub
CVSS SCORE
8.1highDebian
-
Ubuntu
-
CVSS SCORE
N/AmediumGoLang
-
Red Hat
2.2
CVSS SCORE
8.1mediumChainguard
CGA-496j-hq3q-g45c
-
Chainguard
CGA-4hmc-wmfh-336v
-
Chainguard
CGA-4jh3-23m4-8qxw
-
Chainguard
CGA-4pf6-2r5m-jg84
-
Chainguard
CGA-58x4-6pgc-mhxm
-
Chainguard
CGA-6g9m-8268-h48w
-
Chainguard
CGA-6m4m-677g-f3j4
-
Chainguard
CGA-7wqj-fcvq-3g57
-
Chainguard
CGA-8953-rp52-8xp5
-
Chainguard
CGA-8hh7-4fgg-pjjg
-
Chainguard
CGA-8hhm-2gj2-7frv
-
Chainguard
CGA-8mrm-h5j2-wc3c
-
Chainguard
CGA-8rhc-266p-3322
-
Chainguard
CGA-975f-x654-5m52
-
Chainguard
CGA-gfg8-q382-vxm2
-
Chainguard
CGA-j8f9-v8xw-8p2v
-
Chainguard
CGA-jm3p-w9q5-5wj3
-
Chainguard
CGA-jm5f-hqm2-2pp9
-
Chainguard
CGA-jqg9-q52j-xxqw
-
Chainguard
CGA-m8pc-889r-jgcp
-
Chainguard
CGA-p6wm-rhwf-ffhv
-
Chainguard
CGA-p8fq-jpp9-hrv2
-
Chainguard
CGA-pf5w-9mcq-4p9c
-
Chainguard
CGA-pmm8-vv22-28g3
-
Chainguard
CGA-ppxp-7x4f-jrj7
-
Chainguard
CGA-qhmq-mvx6-h978
-
Chainguard
CGA-rqqc-qwmr-qw72
-
Chainguard
CGA-v2cx-4q52-cqx9
-
Chainguard
CGA-vjmx-qw83-7m7r
-
Chainguard
CGA-wjrf-22hm-6qx8
-
Chainguard
CGA-wrr7-hg7p-5m8c
-
Chainguard
CGA-x6g9-7234-gh2m
-
Chainguard
CGA-xrhq-f288-6rq9
-
Chainguard
CGA-xvpj-wwc8-c4r5
-