Open dependabot[bot] opened 1 month ago
Can this be actioned please, There is a CVE for versions lower than 8.0.3
Vulnerable Library - aspnetcore.healthchecks.npgsql.8.0.1.nupkg
CVE | Severity | ![]() |
Dependency | Type | Fixed in (aspnetcore.healthchecks.npgsql.8.0.1.nupkg version) | Remediation Possible** |
---|---|---|---|---|---|---|
CVE-2024-32655 | ![]() |
8.1 | npgsql.8.0.0.nupkg | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Npgsql is the open source .NET data provider for PostgreSQL.
Library home page: https://api.nuget.org/packages/npgsql.8.0.0.nupkg
### Vulnerability Details
Npgsql is the .NET data provider for PostgreSQL. In 8.0.2 and earlier, The `WriteBind()` method in `src/Npgsql/Internal/NpgsqlConnector.FrontendMessages.cs` uses `int` variables to store the message length and the sum of parameter lengths. Both variables overflow when the sum of parameter lengths becomes too large. This causes Npgsql to write a message size that is too small when constructing a Postgres protocol message to send it over the network to the database. When parsing the message, the database will only read a small number of bytes and treat any following bytes as new messages while they belong to the old message. Attackers can abuse this to inject arbitrary Postgres protocol messages into the connection, leading to the execution of arbitrary SQL statements on the application's behalf.
Publish Date: 2024-05-09
URL: CVE-2024-32655
### CVSS 3 Score Details (8.1)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here. ### Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-32655
Release Date: 2024-05-09
Fix Resolution: Npgsql - 4.0.14,4.1.13,5.0.18,6.0.11,7.0.7,8.0.3
Bumps Npgsql from 8.0.0 to 8.0.3.
Release notes
Sourced from Npgsql's releases.
Commits
c5aab16
Ignore multirange test pre PG 14d674f28
Fix replication message writing091655e
Merge pull request from GHSA-x9vc-6hfv-hg8cbe50041
Fix output parameter population in batch commands (#5644)5fd00dd
Buffer over-read with ArrayNullabilityMode.PerInstance (#5675)58b9a1b
Start loading composite types before ranges (#5651)4e5fb5a
Add [Experimental] to converter-related APIs (#5668)6927b98
Add ifdef for missing BitConverter.Int32BitsToSingle on ns2.01b93828
GetChars fix and infra cleanup (#5618)07a0702
Require binary format in binary importer (#5648)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show