-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 11 Feb 2025 11:27:41 +0100 Source: postgresql-13 Architecture: source Version: 13.19-0+deb11u1 Distribution: bullseye-security Urgency: medium Maintainer: Debian PostgreSQL Maintainers <team+postgresql@tracker.debian.org> Changed-By: Christoph Berg <myon@debian.org> Changes: postgresql-13 (13.19-0+deb11u1) bullseye-security; urgency=medium . * New upstream version 13.19. . + Harden PQescapeString and allied functions against invalidly-encoded input strings (Andres Freund, Noah Misch) . Data-quoting functions supplied by libpq now fully check the encoding validity of their input. If invalid characters are detected, they report an error if possible. For the ones that lack an error return convention, the output string is adjusted to ensure that the server will report invalid encoding and no intervening processing will be fooled by bytes that might happen to match single quote, backslash, etc. . The purpose of this change is to guard against SQL-injection attacks that are possible if one of these functions is used to quote crafted input. There is no hazard when the resulting string is sent directly to a PostgreSQL server (which would check its encoding anyway), but there is a risk when it is passed through psql or other client-side code. Historically such code has not carefully vetted encoding, and in many cases it's not clear what it should do if it did detect such a problem. . This fix is effective only if the data-quoting function, the server, and any intermediate processing agree on the character encoding that's being used. Applications that insert untrusted input into SQL commands should take special care to ensure that that's true. . Applications and drivers that quote untrusted input without using these libpq functions may be at risk of similar problems. They should first confirm the data is valid in the encoding expected by the server. . The PostgreSQL Project thanks Stephen Fewer for reporting this problem. (CVE-2025-1094) Checksums-Sha1: 98a97881f52a4bcc15da09ffe5875c1becddb1b2 3703 postgresql-13_13.19-0+deb11u1.dsc fdfc2048dbc2b6b8aeded608002f7a4594c420b6 21729020 postgresql-13_13.19.orig.tar.bz2 fc8e316229ff5f32837fa0f694b4cc88f585b1bb 35876 postgresql-13_13.19-0+deb11u1.debian.tar.xz Checksums-Sha256: 59788cf29b344a3830aff5465f2655ed2ac2079b4b2a62d32473342d4e7c7ba1 3703 postgresql-13_13.19-0+deb11u1.dsc 482cce0a9f8d24c2447cfc7b2817e55f86d51afe5f7f1a85214bf93644e774ea 21729020 postgresql-13_13.19.orig.tar.bz2 bb2b70c1c2ce941c7aba34fc0824eaef33cd9ea241ef2967550150fb814f2733 35876 postgresql-13_13.19-0+deb11u1.debian.tar.xz Files: bf9857e3542200496aad91bbb3b671aa 3703 database optional postgresql-13_13.19-0+deb11u1.dsc a567d0fbd4a993673a95ffb230dd6df1 21729020 database optional postgresql-13_13.19.orig.tar.bz2 7429cb64f21e70a4aed8afbd6144daf1 35876 database optional postgresql-13_13.19-0+deb11u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEXEj+YVf0kXlZcIfGTFprqxLSp64FAmeuG9cACgkQTFprqxLS p64qXxAAkwCmxgL1Xlh3xInBvhFh9NLDTENz3Yi2tmtmuhqP7SisT61WLh2Qr7ac i98wR/Prql2SzqTCARW1nIag+a8wmPXIh2qZUOFWeRD3ldaV/k786tnQY7q8YgfD +sCFCzs09WtEbqgngM6YD1F6nCdmGSF8m1DjZzdsoXSB2kDFkObhE5Nn5aVnzOo6 +9uM+rhntHcGEAROCstKY+VUMWjLiO9ALTogK5JNjZd1Noaydhwrg2F+W/8bQPub ThnbCvzfwh2w0G0ndCk1idw5VWJTzACLcNL5bfwSazp+zuXgyOv+P/2evwmgbod9 4UrT7kEq+504McYKPL+fbofG51uj5kKRZjuEVpXadaPjDiVGF+YAgyqGqksIbcfe EQle70EJ8U+ifRM04GLlIR0KdWc/Ns7nXuP6PN1hEDL45JkkBxwYeUx3XjT0oLn3 qk+u/SQztVey6Zz96NYLwCjhAtObEbSaJrvDOp0PsoQ32dLyaPF/0OD5tguNkr8e jTiD0geBfxzpbwk6ENfsNxLGlq8D3FyXS5oo8JgGSfP3BhtNSrSmC+8+O5rRwsK5 W2+ownh4Zd7Axw/4HIhnP78qpoZnVGAAzgrgf+2vMw85n5XCvPH4IVrd5vb+Oc9j iQNwkVROwmVHesDxmJqpWP0wxF9lkptUWiaxcmMVJBNQnZkad3I= =flla -----END PGP SIGNATURE-----