Change History (6)
comment:1 by , 5 weeks ago
Priority: | normal → high |
---|
follow-up: 3 comment:2 by , 5 weeks ago
I don't think we should suspend the psql upgrade when we have a serious CVE to fix. All the pkgs which seem to use psql are 'heavy' ones which i think we do check in detail and tag them later anyhow.
Complexity in psql upgrade increases only when the binary format of the data files needs to be changed which is most likely not the case right now (but i've not checked the docs). If they change, then additional steps are required, if they do not change, its just a CMMI+restart.
comment:3 by , 5 weeks ago
Replying to thomas:
I don't think we should suspend the psql upgrade when we have a serious CVE to fix.
Yes, we will update and tag at the same time. That's why it's in the 12.3 milestone.
comment:4 by , 5 weeks ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
This update is going to be a little bit complicated regarding timing.
First, for context, it's an emergency update to fix CVE-2025-1094. It allows for SQL Injection and arbitrary code execution, and was used to compromise the United States Treasury - https://www.securityweek.com/rapid7-flags-new-postgresql-zero-day-connected-to-beyondtrust-exploitation/
Note that BeyondTrust is a product that is used for remote support, and uses PostgreSQL for it's database. The vulnerability was discovered in PostgreSQL through the usage of that product.
Rapid7 has an advisory here, as they were the ones who discovered it: https://www.rapid7.com/blog/post/2025/02/13/cve-2025-1094-postgresql-psql-sql-injection-fixed/
This would allow attackers who have compromised a PostgreSQL database to be able to execute shell commands, as well as execute SQL statements.
The vulnerability was rated by upstream as High (CVSS score of 8.1)
However, a regression was found - and upstream does not plan on fixing it until February 20th: https://www.postgresql.org/about/news/out-of-cycle-release-scheduled-for-february-20-2025-3016/
This adds a bit of a twist here for package freeze, as we really should update to PostgreSQL 17.3 to fix that vulnerability. For most users, this isn't a problem, but some users running database servers (not using just the client as a build dependency) could be impacted, and very severely depending on the context.
The problem with having to update this package *again* to fix that regression is that it's used in the following places, which would have to be rechecked: