git: 60223989edc3 - main - security/vuln: Add entry for PostgreSQL

From: Palle Girgensohn <girgen_at_FreeBSD.org>
Date: Thu, 13 Feb 2025 15:13:53 UTC
The branch main has been updated by girgen:

URL: https://cgit.FreeBSD.org/ports/commit/?id=60223989edc3125fb2037de333c11f0a34d5e02f

commit 60223989edc3125fb2037de333c11f0a34d5e02f
Author:     Palle Girgensohn <girgen@FreeBSD.org>
AuthorDate: 2025-02-13 15:02:04 +0000
Commit:     Palle Girgensohn <girgen@FreeBSD.org>
CommitDate: 2025-02-13 15:07:28 +0000

    security/vuln: Add entry for PostgreSQL
---
 security/vuxml/vuln/2025.xml | 57 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 57 insertions(+)

diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index b92c2010b357..67f4a88fc429 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,60 @@
+  <vuln vid="fadf3b41-ea19-11ef-a540-6cc21735f730">
+    <topic>PostgreSQL -- PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation</topic>
+    <affects>
+      <package>
+	<name>postgresql17-client</name>
+	<range><lt>17.3</lt></range>
+      </package>
+      <package>
+	<name>postgresql16-client</name>
+	<range><lt>16.7</lt></range>
+      </package>
+      <package>
+	<name>postgresql15-client</name>
+	<range><lt>15.11</lt></range>
+      </package>
+      <package>
+	<name>postgresql14-client</name>
+	<range><lt>14.16</lt></range>
+      </package>
+      <package>
+	<name>postgresql13-client</name>
+	<range><lt>13.19</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The PostgreSQL Project reports:</p>
+	<blockquote cite="https://www.postgresql.org/support/security/CVE-2025-1094/">
+	<p>
+	  Improper neutralization of quoting syntax in PostgreSQL
+	  libpq functions PQescapeLiteral(), PQescapeIdentifier(),
+	  PQescapeString(), and PQescapeStringConn() allows a
+	  database input provider to achieve SQL injection in
+	  certain usage patterns. Specifically, SQL injection
+	  requires the application to use the function result to
+	  construct input to psql, the PostgreSQL interactive
+	  terminal. Similarly, improper neutralization of quoting
+	  syntax in PostgreSQL command line utility programs
+	  allows a source of command line arguments to achieve SQL
+	  injection when client_encoding is BIG5 and
+	  server_encoding is one of EUC_TW or MULE_INTERNAL.
+	  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and
+	  13.19 are affected.
+	</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2025-1094</cvename>
+      <url>https://www.postgresql.org/support/security/CVE-2025-1094/</url>
+    </references>
+    <dates>
+      <discovery>2025-02-13</discovery>
+      <entry>2025-02-13</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="1a8c5720-e9cf-11ef-9e96-2cf05da270f3">
     <topic>Gitlab -- Vulnerabilities</topic>
     <affects>