Skip to content

fix(deps): bump jackc/pgx/v5 to v5.9.0 (CVE-2026-33816)#48

Merged
klaidliadon merged 1 commit into
masterfrom
fix/cve-2026-33816-pgx
May 8, 2026
Merged

fix(deps): bump jackc/pgx/v5 to v5.9.0 (CVE-2026-33816)#48
klaidliadon merged 1 commit into
masterfrom
fix/cve-2026-33816-pgx

Conversation

@klaidliadon
Copy link
Copy Markdown
Contributor

Summary

Patches CVE-2026-33816 — a critical (CVSS 9.8) memory-safety vulnerability in github.com/jackc/pgx/v5 pgproto3 (Backend.Receive() / FunctionCall.Decode()), exploitable via malformed Postgres protocol messages.

  • Bumps jackc/pgx/v5 from v5.7.6 to v5.9.0
  • Go directive bumps to 1.25.0 (pgx v5.9.0's declared minimum); the redundant toolchain go1.24.3 line drops as a result
  • Build + unit tests green locally (integration tests skipped — needs a pgkit_test Postgres)

Refs

Test plan

  • CI green
  • Downstream consumers (most importantly 0xPolygon/omsx) bump pgkit alongside their own pgx pin once tagged

Memory-safety vulnerability in pgproto3 (Backend.Receive() and
FunctionCall.Decode()), exploitable via malformed protocol messages.
CVSS 9.8 (Critical) — network-exploitable, no auth required. Fixed in
v5.9.0.

pgx v5.9.0's go.mod declares `go 1.25.0`, so the go directive bumps in
turn (1.24.0 -> 1.25.0). The toolchain go1.24.3 line drops because the
go directive now matches a stable release.

Refs https://nvd.nist.gov/vuln/detail/CVE-2026-33816,
     https://pkg.go.dev/vuln/GO-2026-4772
@klaidliadon klaidliadon merged commit 9597c0c into master May 8, 2026
1 check passed
@klaidliadon klaidliadon deleted the fix/cve-2026-33816-pgx branch May 8, 2026 07:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant