Debian DSA-1911-1 : pygresql - missing escape function

high Nessus Plugin ID 44776

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

It was discovered that pygresql, a PostgreSQL module for Python, was missing a function to call PQescapeStringConn(). This is needed, because PQescapeStringConn() honours the charset of the connection and prevents insufficient escaping, when certain multibyte character encodings are used. The new function is called pg_escape_string(), which takes the database connection as a first argument. The old function escape_string() has been preserved as well for backwards compatibility.

Developers using these bindings are encouraged to adjust their code to use the new function.

Solution

Upgrade the pygresql packages.

For the oldstable distribution (etch), this problem has been fixed in version 1:3.8.1-1etch2.

For the stable distribution (lenny), this problem has been fixed in version 1:3.8.1-3+lenny1.

See Also

https://www.debian.org/security/2009/dsa-1911

Plugin Details

Severity: High

ID: 44776

File Name: debian_DSA-1911.nasl

Version: 1.10

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:pygresql, cpe:/o:debian:debian_linux:4.0, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 10/14/2009

Reference Information

CVE: CVE-2009-2940

DSA: 1911