Hi Ferenc,

On Sat, Sep 06, 2025 at 12:33:17PM +0200, Ferenc Wágner wrote:
> Dear Security Team,
> 
> Please review the following source debdiff (straight cherry pick from
> the upstream 3.5.1 tag):
> 
> $ debdiff shibboleth-sp_3.5.0+dfsg-2.dsc 
> shibboleth-sp_3.5.0+dfsg-2+deb13u1.dsc 
> diff -Nru shibboleth-sp-3.5.0+dfsg/debian/changelog 
> shibboleth-sp-3.5.0+dfsg/debian/changelog
> --- shibboleth-sp-3.5.0+dfsg/debian/changelog 2025-01-12 13:52:44.000000000 
> +0100
> +++ shibboleth-sp-3.5.0+dfsg/debian/changelog 2025-09-06 11:46:12.000000000 
> +0200
> @@ -1,3 +1,14 @@
> +shibboleth-sp (3.5.0+dfsg-2+deb13u1) trixie-security; urgency=high
> +
> +  * [627cc27] New patch: SSPCPP-1014 - Extend escaping in strings.
> +    Fix SQL injection vulnerability in Service Provider ODBC plugin:
> +    specially crafted inputs can exfiltrate information stored in the
> +    database used by the SP.  The vulnerability is moderate to high
> +    severity for anyone using the ODBC plugin, and of no impact for others.
> +    Thanks to Scott Cantor (Closes: #1114506)
> +
> + -- Ferenc Wágner <[email protected]>  Sat, 06 Sep 2025 11:46:12 +0200
> +
>  shibboleth-sp (3.5.0+dfsg-2) unstable; urgency=medium
>  
>    * Upload to unstable
> diff -Nru shibboleth-sp-3.5.0+dfsg/debian/gbp.conf 
> shibboleth-sp-3.5.0+dfsg/debian/gbp.conf
> --- shibboleth-sp-3.5.0+dfsg/debian/gbp.conf  2023-01-22 14:20:06.000000000 
> +0100
> +++ shibboleth-sp-3.5.0+dfsg/debian/gbp.conf  2025-09-06 11:43:32.000000000 
> +0200
> @@ -1,5 +1,5 @@
>  [DEFAULT]
> -debian-branch = debian/master
> +debian-branch = debian/trixie
>  upstream-branch = upstream/latest
>  pristine-tar = True
>  
> diff -Nru shibboleth-sp-3.5.0+dfsg/debian/patches/series 
> shibboleth-sp-3.5.0+dfsg/debian/patches/series
> --- shibboleth-sp-3.5.0+dfsg/debian/patches/series    2025-01-03 
> 22:53:32.000000000 +0100
> +++ shibboleth-sp-3.5.0+dfsg/debian/patches/series    2025-09-06 
> 11:44:50.000000000 +0200
> @@ -3,3 +3,4 @@
>  Debianize-the-systemd-service-file-of-shibd.patch
>  seckeygen-defaults-for-Debian.patch
>  Use-runstatedir-from-future-Autoconf-2.70.patch
> +SSPCPP-1014-Extend-escaping-in-strings.patch
> diff -Nru 
> shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
>  
> shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
> --- 
> shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
>       1970-01-01 01:00:00.000000000 +0100
> +++ 
> shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
>       2025-09-06 11:44:50.000000000 +0200
> @@ -0,0 +1,25 @@
> +From: Scott Cantor <[email protected]>
> +Date: Wed, 3 Sep 2025 08:45:54 -0400
> +Subject: SSPCPP-1014 - Extend escaping in strings
> +
> +---
> + odbc-store/odbc-store.cpp | 5 +++--
> + 1 file changed, 3 insertions(+), 2 deletions(-)
> +
> +diff --git a/odbc-store/odbc-store.cpp b/odbc-store/odbc-store.cpp
> +index 2316e95..aae8520 100644
> +--- a/odbc-store/odbc-store.cpp
> ++++ b/odbc-store/odbc-store.cpp
> +@@ -255,9 +255,10 @@ namespace {
> +         string m_copy;
> +     public:
> +         SQLString(const char* src) : m_src(src) {
> +-            if (strchr(src, '\'')) {
> ++            if (strchr(src, '\\') || strchr(src, '\'')) {
> +                 m_copy = src;
> +-                replace_all(m_copy, "'", "''");
> ++                replace_all(m_copy, "\\", "\\\\");
> ++                replace_all(m_copy, "'", "\\'");
> +             }
> +         }
> + 

Unfortunately the upstream issue is not accessible, but based on above
it looks good. Please upload this to security-master (make sure to
build with -sa).

> Upstream is requesting a CVE ID for this issue, but I don't know it
> yet.

Ok!

> I'm ready to upload on your word.  Do you still handle bookworm security
> uploads, or is that LTS territory now?

yes bookworm is still regularly supported, will have a look at your
second diff as well.

Regards,
Salvatore

Reply via email to