chore(deps): update security updates [security]#138
Conversation
|
Caution Review failedThe pull request is closed. ℹ️ Recent review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
Disabled knowledge base sources:
📝 WalkthroughWalkthroughBumps several indirect Go module versions in ChangesDependency Update
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
🚥 Pre-merge checks | ✅ 5✅ Passed checks (5 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Tip 💬 Introducing Slack Agent: The best way for teams to turn conversations into code.Slack Agent is built on CodeRabbit's deep understanding of your code, so your team can collaborate across the entire SDLC without losing context.
Built for teams:
One agent for your entire SDLC. Right inside Slack. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@go.mod`:
- Line 104: The go.mod dependency line for github.com/jackc/pgx/v5 should be
bumped from v5.9.0 to v5.9.1 to pull in the latest security patch; update the
version string for the module named "github.com/jackc/pgx/v5" and then run "go
get github.com/jackc/pgx/v5@v5.9.1" (or equivalent) followed by "go mod tidy" to
refresh go.sum and ensure the lockfile and transitive deps are updated; verify
no import paths or code changes are required for pgx functions/types used in the
codebase after the upgrade.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Path: .coderabbit.yaml
Review profile: CHILL
Plan: Pro
Run ID: 8674f14c-df16-4e0c-865f-d0001ec5011a
⛔ Files ignored due to path filters (1)
go.sumis excluded by!**/*.sum
📒 Files selected for processing (1)
go.mod
d88807a to
f04c3da
Compare
869e773 to
89ecdfd
Compare
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
89ecdfd to
5df4491
Compare
This PR contains the following updates:
v5.7.6->v5.9.2v0.52.0->v0.53.0GitHub Vulnerability Alerts
CVE-2026-33816
Memory-safety vulnerability in github.com/jackc/pgx/v5.
CVE-2026-41889
Impact
SQL Injection can occur when:
e.g.
This is unlikely to occur outside of a contrived scenario.
Patches
The problem is resolved in v5.9.2.
Workarounds
Do not use the simple protocol to execute queries matching all the above conditions.
CVE-2026-33815 in github.com/jackc/pgx
CVE-2026-33815 / GHSA-xgrm-4fwx-7qm8 / GO-2026-4771
More information
Details
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Severity
Unknown
References
No references.
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Memory-safety vulnerability in github.com/jackc/pgx/v5.
CVE-2026-33816 / GHSA-9jj7-4m8r-rfcm / GO-2026-4772
More information
Details
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
CVE-2026-33816 in github.com/jackc/pgx
CVE-2026-33816 / GHSA-9jj7-4m8r-rfcm / GO-2026-4772
More information
Details
Memory-safety vulnerability in github.com/jackc/pgx/v5.
Severity
Unknown
References
No references.
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
pgx: SQL Injection via placeholder confusion with dollar quoted string literals
CVE-2026-41889 / GHSA-j88v-2chj-qfwx
More information
Details
Impact
SQL Injection can occur when:
e.g.
This is unlikely to occur outside of a contrived scenario.
Patches
The problem is resolved in v5.9.2.
Workarounds
Do not use the simple protocol to execute queries matching all the above conditions.
Severity
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net
CVE-2026-33814 / GO-2026-4918
More information
Details
When processing HTTP/2 SETTINGS frames, transport will enter an infinite loop of writing CONTINUATION frames if it receives a SETTINGS_MAX_FRAME_SIZE with a value of 0.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Release Notes
jackc/pgx (github.com/jackc/pgx/v5)
v5.9.2Compare Source
v5.9.1Compare Source
v5.9.0Compare Source
v5.8.0Compare Source
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.
Summary by CodeRabbit