Dear Security Team,

Please review the following source debdiff (straight cherry pick from
the upstream 3.5.1 tag):

$ debdiff shibboleth-sp_3.5.0+dfsg-2.dsc shibboleth-sp_3.5.0+dfsg-2+deb13u1.dsc 
diff -Nru shibboleth-sp-3.5.0+dfsg/debian/changelog 
shibboleth-sp-3.5.0+dfsg/debian/changelog
--- shibboleth-sp-3.5.0+dfsg/debian/changelog   2025-01-12 13:52:44.000000000 
+0100
+++ shibboleth-sp-3.5.0+dfsg/debian/changelog   2025-09-06 11:46:12.000000000 
+0200
@@ -1,3 +1,14 @@
+shibboleth-sp (3.5.0+dfsg-2+deb13u1) trixie-security; urgency=high
+
+  * [627cc27] New patch: SSPCPP-1014 - Extend escaping in strings.
+    Fix SQL injection vulnerability in Service Provider ODBC plugin:
+    specially crafted inputs can exfiltrate information stored in the
+    database used by the SP.  The vulnerability is moderate to high
+    severity for anyone using the ODBC plugin, and of no impact for others.
+    Thanks to Scott Cantor (Closes: #1114506)
+
+ -- Ferenc Wágner <[email protected]>  Sat, 06 Sep 2025 11:46:12 +0200
+
 shibboleth-sp (3.5.0+dfsg-2) unstable; urgency=medium
 
   * Upload to unstable
diff -Nru shibboleth-sp-3.5.0+dfsg/debian/gbp.conf 
shibboleth-sp-3.5.0+dfsg/debian/gbp.conf
--- shibboleth-sp-3.5.0+dfsg/debian/gbp.conf    2023-01-22 14:20:06.000000000 
+0100
+++ shibboleth-sp-3.5.0+dfsg/debian/gbp.conf    2025-09-06 11:43:32.000000000 
+0200
@@ -1,5 +1,5 @@
 [DEFAULT]
-debian-branch = debian/master
+debian-branch = debian/trixie
 upstream-branch = upstream/latest
 pristine-tar = True
 
diff -Nru shibboleth-sp-3.5.0+dfsg/debian/patches/series 
shibboleth-sp-3.5.0+dfsg/debian/patches/series
--- shibboleth-sp-3.5.0+dfsg/debian/patches/series      2025-01-03 
22:53:32.000000000 +0100
+++ shibboleth-sp-3.5.0+dfsg/debian/patches/series      2025-09-06 
11:44:50.000000000 +0200
@@ -3,3 +3,4 @@
 Debianize-the-systemd-service-file-of-shibd.patch
 seckeygen-defaults-for-Debian.patch
 Use-runstatedir-from-future-Autoconf-2.70.patch
+SSPCPP-1014-Extend-escaping-in-strings.patch
diff -Nru 
shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
 
shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
--- 
shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
        1970-01-01 01:00:00.000000000 +0100
+++ 
shibboleth-sp-3.5.0+dfsg/debian/patches/SSPCPP-1014-Extend-escaping-in-strings.patch
        2025-09-06 11:44:50.000000000 +0200
@@ -0,0 +1,25 @@
+From: Scott Cantor <[email protected]>
+Date: Wed, 3 Sep 2025 08:45:54 -0400
+Subject: SSPCPP-1014 - Extend escaping in strings
+
+---
+ odbc-store/odbc-store.cpp | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/odbc-store/odbc-store.cpp b/odbc-store/odbc-store.cpp
+index 2316e95..aae8520 100644
+--- a/odbc-store/odbc-store.cpp
++++ b/odbc-store/odbc-store.cpp
+@@ -255,9 +255,10 @@ namespace {
+         string m_copy;
+     public:
+         SQLString(const char* src) : m_src(src) {
+-            if (strchr(src, '\'')) {
++            if (strchr(src, '\\') || strchr(src, '\'')) {
+                 m_copy = src;
+-                replace_all(m_copy, "'", "''");
++                replace_all(m_copy, "\\", "\\\\");
++                replace_all(m_copy, "'", "\\'");
+             }
+         }
+ 

Upstream is requesting a CVE ID for this issue, but I don't know it
yet.

I'm ready to upload on your word.  Do you still handle bookworm security
uploads, or is that LTS territory now?
-- 
Thanks,
Feri.

Reply via email to