build(deps): bump github.com/jackc/pgx/v5 from 5.7.5 to 5.9.0#3051
build(deps): bump github.com/jackc/pgx/v5 from 5.7.5 to 5.9.0#3051dependabot[bot] wants to merge 1 commit into
Conversation
Bumps [github.com/jackc/pgx/v5](https://github.com/jackc/pgx) from 5.7.5 to 5.9.0. - [Changelog](https://github.com/jackc/pgx/blob/master/CHANGELOG.md) - [Commits](jackc/pgx@v5.7.5...v5.9.0) --- updated-dependencies: - dependency-name: github.com/jackc/pgx/v5 dependency-version: 5.9.0 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
Kusari Analysis Results:Caution Flagged Issues Detected While the code security analysis returned zero findings (no code issues, exposed secrets, or workflow concerns), the dependency analysis identifies a blocking critical vulnerability that prevents this PR from merging safely. CVE-2026-33815 (GHSA-xgrm-4fwx-7qm8, CVSS 9.8: network-exploitable, no privileges required, no user interaction) is a memory-safety vulnerability that remains present in the proposed github.com/jackc/pgx/v5 v5.9.0 upgrade. This is a direct dependency of the project, meaning the attack surface is immediate and unmitigated. Additionally, v5.9.0 is not the latest available release — v5.9.1 exists and may resolve this vulnerability. A clean code scan does not offset an unresolved critical dependency CVE; these are independent risk dimensions. Action required before merging: run 'go get github.com/jackc/pgx/v5@v5.9.1', verify whether CVE-2026-33815 is resolved in that version, and update the PR accordingly. If v5.9.1 does not address the vulnerability, apply input validation mitigations on all untrusted data passed to pgx query functions and track the upstream advisory for a fix. Note View full detailed analysis result for more information on the output and the checks that were run. Required Dependency Mitigations
Found this helpful? Give it a 👍 or 👎 reaction! |
|
Closing as invalid — upgrading directly to v5.9.1 instead. |
|
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting If you change your mind, just re-open this PR and I'll resolve any conflicts on it. |
Bumps github.com/jackc/pgx/v5 from 5.7.5 to 5.9.0.
Changelog
Sourced from github.com/jackc/pgx/v5's changelog.
... (truncated)
Commits
b4d8e62Release v5.9.0c227cd4Bump minimum Go version from 1.24 to 1.25f492c14Use reflect.TypeFor instead of reflect.TypeOf for static typesad8fb08Use sync.WaitGroup.Go to simplify goroutine spawning3033773Remove go1.26 build tag from synctest test83ffb3cValidate multirange element count against source length before allocating828f214Fix message length parsing on 32-bit platformse196a39Add fuzz test for SQL lexer in sanitize package7f969f8Rename TraceQueryute to traceExecuteab52391Use single Stat snapshot in checkMinConnsDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.