CVE-2024-27304

ADVISORY - github

Summary

Impact

SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control.

Patches

The problem is resolved in v4.18.2 and v5.5.4.

Workarounds

Reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

EPSS Score: 0.02175 (0.839)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Integer Overflow or Wraparound

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

ADVISORY - github

Integer Overflow or Wraparound

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Integer Overflow or Wraparound

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in