[ 
https://issues.apache.org/jira/browse/IMPALA-13180?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Smith resolved IMPALA-13180.
------------------------------------
    Fix Version/s: Impala 4.5.0
       Resolution: Fixed

> Upgrade postgresql to 42.5.5
> ----------------------------
>
>                 Key: IMPALA-13180
>                 URL: https://issues.apache.org/jira/browse/IMPALA-13180
>             Project: IMPALA
>          Issue Type: Task
>            Reporter: Pranav Yogi Lodha
>            Assignee: Pranav Yogi Lodha
>            Priority: Critical
>             Fix For: Impala 4.5.0
>
>
> Upgrade postgresql to 42.5.5 due to CVE-2024-1597
> Affected versions of this package are vulnerable to SQL Injection when using 
> {{{}PreferQueryMode=SIMPLE{}}}, which is not the default setting. By passing 
> in a numeric value placeholder immediately preceded by a minus and followed 
> by a second placeholder for a string value, on the same line, an attacker can 
> construct a payload that alters the parameterized query into which it is 
> interpolated. This effectively bypasses the protections against SQL Injection 
> that parameterized queries offer.
> [https://security.snyk.io/vuln/SNYK-JAVA-ORGPOSTGRESQL-6252740] 
> [https://github.com/advisories/GHSA-24rp-q3w6-vc56] 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to