Require PGP-decrypted text to pass encoding validation.

pgp_sym_decrypt() and pgp_pub_decrypt() will raise such errors, while
bytea variants will not.  The existing "dat3" test decrypted to non-UTF8
text, so switch that query to bytea.

The long-term intent is for type "text" to always be valid in the
database encoding.  pgcrypto has long been known as a source of
exceptions to that intent, but a report about exploiting invalid values
of type "text" brought this module to the forefront.  This particular
exception is straightforward to fix, with reasonable effect on user
queries.  Back-patch to v14 (all supported versions).

Reported-by: Paul Gerste (as part of zeroday.cloud)
Reported-by: Moritz Sanft (as part of zeroday.cloud)
Author: shihao zhong <[email protected]>
Reviewed-by: cary huang <[email protected]>
Discussion: 
https://postgr.es/m/CAGRkXqRZyo0gLxPJqUsDqtWYBbgM14betsHiLRPj9mo2=z9...@mail.gmail.com
Backpatch-through: 14
Security: CVE-2026-2006

Branch
------
master

Details
-------
https://git.postgresql.org/pg/commitdiff/d536aee5566354e42a1012da9dd3960e45402af5

Modified Files
--------------
contrib/pgcrypto/expected/pgp-decrypt.out   | 23 ++++++++++++++++++++++-
contrib/pgcrypto/expected/pgp-decrypt_1.out | 23 ++++++++++++++++++++++-
contrib/pgcrypto/pgp-pgsql.c                |  2 ++
contrib/pgcrypto/sql/pgp-decrypt.sql        | 22 +++++++++++++++++++++-
4 files changed, 67 insertions(+), 3 deletions(-)

Reply via email to