Debian Package Tracker
Register | Log in
Subscribe

golang-github-jackc-pgconn

low-level PostgreSQL database driver

Choose email to subscribe with

general
  • source: golang-github-jackc-pgconn (main)
  • version: 1.14.3-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Pirate Praveen [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.11.0-2
  • stable: 1.14.0-1
  • testing: 1.14.3-1
  • unstable: 1.14.3-1
versioned links
  • 1.11.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.14.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.14.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-jackc-pgconn-dev
action needed
1 low-priority security issue in trixie low

There is 1 open security issue in trixie.

1 issue left for the package maintainer to handle:
  • CVE-2024-27304: (needs triaging) pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-03-19 Last update: 2026-03-22 04:00
1 low-priority security issue in bookworm low

There is 1 open security issue in bookworm.

1 issue left for the package maintainer to handle:
  • CVE-2024-27304: (needs triaging) pgx is a PostgreSQL driver and toolkit for Go. SQL injection can occur if an attacker can cause a single query or bind message to exceed 4 GB in size. An integer overflow in the calculated message size can cause the one large message to be sent as multiple messages under the attacker's control. The problem is resolved in v4.18.2 and v5.5.4. As a workaround, reject user input large enough to cause a single query or bind message to exceed 4 GB in size.

You can find information about how to handle this issue in the security team's documentation.

Created: 2026-03-19 Last update: 2026-03-22 04:00
news
[rss feed]
  • [2026-03-22] golang-github-jackc-pgconn 1.14.3-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-20] Accepted golang-github-jackc-pgconn 1.14.3-1 (source) into unstable (Simon Josefsson)
  • [2026-03-18] Accepted golang-github-jackc-pgconn 1.14.3-1~exp0 (source) into experimental (Simon Josefsson)
  • [2024-02-29] golang-github-jackc-pgconn 1.14.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-29] golang-github-jackc-pgconn 1.14.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-27] Accepted golang-github-jackc-pgconn 1.14.0-1 (source) into unstable (Anthony Fok)
  • [2022-04-01] golang-github-jackc-pgconn 1.11.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-29] Accepted golang-github-jackc-pgconn 1.11.0-2 (source) into unstable (Pirate Praveen) (signed by: Praveen Arimbrathodiyil)
  • [2022-03-28] Accepted golang-github-jackc-pgconn 1.11.0-1 (source all) into unstable, unstable (Debian FTP Masters) (signed by: Praveen Arimbrathodiyil)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.14.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing