harbor-fips-2.15
github.com/jackc/pgproto3/v2
Build, ship, and run secure software with minimal, hardened container images — rebuilt from source daily and guarded under our industry-leading remediation SLA.
Start for freeStatus
Impact
The vulnerable component is github.com/jackc/pgproto3/v2. Per the GitHub Security Advisory at https://github.com/advisories/GHSA-jqcq-xjh3-6g23 (Denial of service in github.com/jackc/pgproto3/v2), github.com/jackc/pgproto3/v2 is listed as affected with no published fixed version (vulnerable range >=2.0.0,<=2.3.3). The advisory tracks the v2 module path only and declares no firstPatchedVersion; the v2 branch is not receiving the fix. Without an upstream patched release of github.com/jackc/pgproto3/v2, this issue cannot be closed by routine dependency-bump automation. A pending-upstream-fix advisory event is justified: the issue should reflect that we are awaiting either an upstream v2 fix, or a package-level migration to a successor module path.
Status
Impact
Govulncheck found vulnerable symbols in Go binary at usr/bin/harbor-core.
Status