build(deps): bump github.com/jackc/pgx/v5 from 5.4.2 to 5.5.4#21
build(deps): bump github.com/jackc/pgx/v5 from 5.4.2 to 5.5.4#21dependabot[bot] wants to merge 1 commit intomainfrom
Conversation
Bumps [github.com/jackc/pgx/v5](https://github.com/jackc/pgx) from 5.4.2 to 5.5.4. - [Changelog](https://github.com/jackc/pgx/blob/master/CHANGELOG.md) - [Commits](jackc/pgx@v5.4.2...v5.5.4) --- updated-dependencies: - dependency-name: github.com/jackc/pgx/v5 dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
|
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. Summary: The code changes in this pull request update the versions of two dependencies used in the project: However, it's important to thoroughly test the application after updating dependencies to ensure that the changes do not introduce any regressions or unexpected behavior. Additionally, it's a good idea to review the release notes and changelogs for the updated dependencies to understand the nature of the changes and any potential security implications. Overall, this code change appears to be a routine dependency update, which is a common practice in software development. As long as the updates are properly tested and validated, they should not raise any major security concerns. Files Changed:
Powered by DryRun Security |
Vulnerable Libraries (1)
More info on how to fix Vulnerable Libraries in Go. 👉 Go to the dashboard for detailed results. 📥 Happy? Share your feedback with us. |
Bumps github.com/jackc/pgx/v5 from 5.4.2 to 5.5.4.
Changelog
Sourced from github.com/jackc/pgx/v5's changelog.
... (truncated)
Commits
da6f2c9Update changelogc543134SQL sanitizer wraps arguments in parentheses20344dfCheck for overflow on uint16 sizes in pgproto3adbb38fDo not allow protocol messages larger than ~1GBc1b0a01Fix behavior of CollectRows to return empty slice if Rows are empty88dfc22Fix simple protocol encoding of json.RawMessage2e84dcc*Pipeline.getResults should close pipeline on errord149d3fFix panic in TryFindUnderlyingTypeScanPlan046f497deallocateInvalidatedCachedStatements now runs in transactions8896bd6Handle invalid sslkey fileDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)You can disable automated security fix PRs for this repo from the Security Alerts page.