Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to content

Commit 1ea6e89

Browse files
committed
Last-minute updates for release notes.
Security: CVE-2025-1094
1 parent 85c1fcc commit 1ea6e89

File tree

1 file changed

+96
-0
lines changed

1 file changed

+96
-0
lines changed

doc/src/sgml/release-17.sgml

+96
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,102 @@
3535

3636
<listitem>
3737
<!--
38+
Author: Andres Freund <andres@anarazel.de>
39+
Branch: master [5dc1e42b4] 2025-02-10 10:03:37 -0500
40+
Branch: REL_17_STABLE [43a77239d] 2025-02-10 10:03:38 -0500
41+
Branch: REL_16_STABLE [92e4170f4] 2025-02-10 10:03:39 -0500
42+
Branch: REL_15_STABLE [370c94d4c] 2025-02-10 10:03:39 -0500
43+
Branch: REL_14_STABLE [e0ef3d776] 2025-02-10 10:03:40 -0500
44+
Branch: REL_13_STABLE [c906bfe1b] 2025-02-10 10:03:40 -0500
45+
Branch: master [4dc289635] 2025-02-10 10:03:37 -0500
46+
Branch: REL_17_STABLE [7d43ca6fe] 2025-02-10 10:03:38 -0500
47+
Branch: REL_16_STABLE [6e05b195d] 2025-02-10 10:03:39 -0500
48+
Branch: REL_15_STABLE [703b3fd5d] 2025-02-10 10:03:39 -0500
49+
Branch: REL_14_STABLE [5bc33cbea] 2025-02-10 10:03:40 -0500
50+
Branch: REL_13_STABLE [db3eb0e82] 2025-02-10 10:03:40 -0500
51+
Branch: master [3e98c8ce5] 2025-02-10 10:03:37 -0500
52+
Branch: REL_17_STABLE [61ad93cdd] 2025-02-10 10:03:38 -0500
53+
Branch: REL_16_STABLE [56aa2dcdd] 2025-02-10 10:03:39 -0500
54+
Branch: REL_15_STABLE [b1756da75] 2025-02-10 10:03:39 -0500
55+
Branch: REL_14_STABLE [2ae54ae17] 2025-02-10 10:03:40 -0500
56+
Branch: REL_13_STABLE [5df4e1632] 2025-02-10 10:03:40 -0500
57+
Branch: master [ac00ff1c9] 2025-02-10 10:03:37 -0500
58+
Branch: REL_17_STABLE [02d4d87ac] 2025-02-10 10:03:38 -0500
59+
Branch: REL_16_STABLE [01784793f] 2025-02-10 10:03:39 -0500
60+
Branch: REL_15_STABLE [de4b92f33] 2025-02-10 10:03:39 -0500
61+
Branch: REL_14_STABLE [46ddf98df] 2025-02-10 10:03:40 -0500
62+
Branch: REL_13_STABLE [4ea3f5ef3] 2025-02-10 10:03:40 -0500
63+
Branch: master [979205e47] 2025-02-10 12:12:14 -0500
64+
Branch: REL_17_STABLE [05abb0f83] 2025-02-10 12:12:53 -0500
65+
Branch: REL_16_STABLE [41343f840] 2025-02-10 12:12:56 -0500
66+
Branch: REL_15_STABLE [a085fa731] 2025-02-10 12:12:58 -0500
67+
Branch: REL_14_STABLE [4a6825c76] 2025-02-10 12:12:59 -0500
68+
Branch: REL_13_STABLE [7beb2af5e] 2025-02-10 12:13:02 -0500
69+
Branch: REL_13_STABLE [00f1a1f66] 2025-02-10 10:03:40 -0500
70+
Author: Tom Lane <tgl@sss.pgh.pa.us>
71+
Branch: master [5bf12323b] 2025-02-10 16:30:03 -0500
72+
Branch: REL_17_STABLE [85c1fcc65] 2025-02-10 16:30:31 -0500
73+
Branch: REL_16_STABLE [0075a5c6c] 2025-02-10 16:30:37 -0500
74+
Branch: REL_15_STABLE [9862de917] 2025-02-10 16:30:54 -0500
75+
Branch: REL_14_STABLE [e1f1b030d] 2025-02-10 16:31:01 -0500
76+
Branch: REL_13_STABLE [f9fceef6e] 2025-02-10 16:31:09 -0500
77+
-->
78+
<para>
79+
Harden <function>PQescapeString</function> and allied functions
80+
against invalidly-encoded input strings (Andres Freund, Noah Misch)
81+
<ulink url="&commit_baseurl;43a77239d">&sect;</ulink>
82+
<ulink url="&commit_baseurl;7d43ca6fe">&sect;</ulink>
83+
<ulink url="&commit_baseurl;61ad93cdd">&sect;</ulink>
84+
<ulink url="&commit_baseurl;02d4d87ac">&sect;</ulink>
85+
<ulink url="&commit_baseurl;05abb0f83">&sect;</ulink>
86+
<ulink url="&commit_baseurl;85c1fcc65">&sect;</ulink>
87+
</para>
88+
89+
<para>
90+
Data-quoting functions supplied by <application>libpq</application>
91+
now fully check the encoding validity of their input. If invalid
92+
characters are detected, they report an error if possible. For the
93+
ones that lack an error return convention, the output string is
94+
adjusted to ensure that the server will report invalid encoding and
95+
no intervening processing will be fooled by bytes that might happen
96+
to match single quote, backslash, etc.
97+
</para>
98+
99+
<para>
100+
The purpose of this change is to guard against SQL-injection attacks
101+
that are possible if one of these functions is used to quote crafted
102+
input. There is no hazard when the resulting string is sent
103+
directly to a <productname>PostgreSQL</productname> server (which
104+
would check its encoding anyway), but there is a risk when it is
105+
passed through <application>psql</application> or other client-side
106+
code. Historically such code has not carefully vetted encoding, and
107+
in many cases it's not clear what it should do if it did detect such
108+
a problem.
109+
</para>
110+
111+
<para>
112+
This fix is effective only if the data-quoting function, the server,
113+
and any intermediate processing agree on the character encoding
114+
that's being used. Applications that insert untrusted input into
115+
SQL commands should take special care to ensure that that's true.
116+
</para>
117+
118+
<para>
119+
Applications and drivers that quote untrusted input without using
120+
these <application>libpq</application> functions may be at risk of
121+
similar problems. They should first confirm the data is valid in
122+
the encoding expected by the server.
123+
</para>
124+
125+
<para>
126+
The <productname>PostgreSQL</productname> Project thanks
127+
Stephen Fewer for reporting this problem.
128+
(CVE-2025-1094)
129+
</para>
130+
</listitem>
131+
132+
<listitem>
133+
<!--
38134
Author: Nathan Bossart <nathan@postgresql.org>
39135
Branch: master [a0ff56e2d] 2024-12-12 15:52:04 -0600
40136
Branch: REL_17_STABLE [d09fbf645] 2024-12-12 15:52:04 -0600

0 commit comments

Comments
 (0)