[ubuntu/noble-updates] postgresql-16 16.8-0ubuntu0.24.04.1 (Accepted)
Ubuntu Archive Robot
ubuntu-archive-robot at lists.canonical.com
Mon Mar 3 16:29:57 UTC 2025
postgresql-16 (16.8-0ubuntu0.24.04.1) noble-security; urgency=medium
* New upstream version (LP: #2099900).
+ This release encompasses changes from upstream's 16.7 and 16.8
releases. The former contains fixes for CVE-2025-1094 (among other
things), and the latter was a hotfix for a problem caused by the CVE
fix from 16.7.
+ A dump/restore is not required for those running 16.X.
+ However, if you are upgrading from a version earlier than 16.5, see
those release notes as well please.
+ Harden PQescapeString and allied functions against invalidly-encoded
input strings (Andres Freund, Noah Misch)
Data-quoting functions supplied by libpq now fully check the encoding
validity of their input. If invalid characters are detected, they report
an error if possible. For the ones that lack an error return convention,
the output string is adjusted to ensure that the server will report
invalid encoding and no intervening processing will be fooled by bytes
that might happen to match single quote, backslash, etc.
The purpose of this change is to guard against SQL-injection attacks
that are possible if one of these functions is used to quote crafted
input. There is no hazard when the resulting string is sent directly to
a PostgreSQL server (which would check its encoding anyway), but there
is a risk when it is passed through psql or other client-side code.
Historically such code has not carefully vetted encoding, and in many
cases it's not clear what it should do if it did detect such a problem.
This fix is effective only if the data-quoting function, the server, and
any intermediate processing agree on the character encoding that's being
used. Applications that insert untrusted input into SQL commands should
take special care to ensure that that's true.
Applications and drivers that quote untrusted input without using these
libpq functions may be at risk of similar problems. They should first
confirm the data is valid in the encoding expected by the server.
The PostgreSQL Project thanks Stephen Fewer for reporting this problem.
(CVE-2025-1094)
+ Improve behavior of libpq's quoting functions (Andres Freund, Tom Lane)
The changes made for CVE-2025-1094 had one serious oversight:
PQescapeLiteral() and PQescapeIdentifier() failed to honor their string
length parameter, instead always reading to the input string's trailing
null. This resulted in including unwanted text in the output, if the
caller intended to truncate the string via the length parameter. With
very bad luck it could cause a crash due to reading off the end of
memory.
In addition, modify all these quoting functions so that when invalid
encoding is detected, an invalid sequence is substituted for just the
first byte of the presumed character, not all of it. This reduces the
risk of problems if a calling application performs additional processing
on the quoted string.
+ Details about these and many further changes can be found at:
https://www.postgresql.org/docs/16/release-16-7.html and
https://www.postgresql.org/docs/16/release-16-8.html.
* d/postgresql-16.NEWS: Update.
Date: 2025-02-28 19:15:31.575114+00:00
Changed-By: Athos Ribeiro <athos.ribeiro at canonical.com>
Signed-By: Ubuntu Archive Robot <ubuntu-archive-robot at lists.canonical.com>
https://launchpad.net/ubuntu/+source/postgresql-16/16.8-0ubuntu0.24.04.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the noble-changes
mailing list