CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

Started by 김주연over 1 year ago27 messagesgeneral
Jump to latest
#1김주연
mysylph@gmail.com

Hello, I am currently using PostgreSQL 11.10 and would like to know if the
CVE-2024-10979 vulnerability affects this version.
If it does impact my version, I would like to know which version I should
upgrade to.

#2Adrian Klaver
adrian.klaver@aklaver.com
In reply to: 김주연 (#1)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On 11/20/24 22:44, 김주연 wrote:

Hello, I am currently using PostgreSQL 11.10 and would like to know if
the CVE-2024-10979 vulnerability affects this version.

Postgres 11 is past EOL, see:

https://www.postgresql.org/support/versioning/

If it does impact my version, I would like to know which version I
should upgrade to.

Any version from 13+.

--
Adrian Klaver
adrian.klaver@aklaver.com

#3김주연
mysylph@gmail.com
In reply to: Adrian Klaver (#2)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

Thank you for your response.

2024년 11월 21일 (목) 오후 3:54, Adrian Klaver <adrian.klaver@aklaver.com>님이 작성:

Show quoted text

On 11/20/24 22:44, 김주연 wrote:

Hello, I am currently using PostgreSQL 11.10 and would like to know if
the CVE-2024-10979 vulnerability affects this version.

Postgres 11 is past EOL, see:

https://www.postgresql.org/support/versioning/

If it does impact my version, I would like to know which version I
should upgrade to.

Any version from 13+.

--
Adrian Klaver
adrian.klaver@aklaver.com

#4Subhash Udata
subhashudata@gmail.com
In reply to: Adrian Klaver (#2)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

Hi Adrian,

Thank you for your response regarding the affected versions of PostgreSQL.
I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*. However,
your reply states that any version greater than 13+ should suffice.

Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13?

Your guidance will help us determine the appropriate upgrade path for our
environment.

Thank you for your time and assistance.

On Thu, 21 Nov 2024 at 12:24, Adrian Klaver <adrian.klaver@aklaver.com>
wrote:

Show quoted text

On 11/20/24 22:44, 김주연 wrote:

Hello, I am currently using PostgreSQL 11.10 and would like to know if
the CVE-2024-10979 vulnerability affects this version.

Postgres 11 is past EOL, see:

https://www.postgresql.org/support/versioning/

If it does impact my version, I would like to know which version I
should upgrade to.

Any version from 13+.

--
Adrian Klaver
adrian.klaver@aklaver.com

#5David G. Johnston
david.g.johnston@gmail.com
In reply to: Subhash Udata (#4)

On Thursday, November 21, 2024, Subhash Udata <subhashudata@gmail.com>
wrote:

Thank you for your response regarding the affected versions of PostgreSQL.
I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*. However,
your reply states that any version greater than 13+ should suffice.

Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13

It was literally just reported and fixed. If you are on a supported
release of PostgreSQL you have the fix. If you are not, you don’t.

At this point only major versions 13+ are supported.

Upgrading to an unsupported minor release is never recommended.

The fact you are on version 11 means you should not expect an answer to the
question whether this newly discovered CVE affects you - that would be
expecting support for a long-unsupported version.

Which of the 5 currently supported releases you should upgrade to is a
decision you need to make given your circumstances.

David J.

#6Subhash Udata
subhashudata@gmail.com
In reply to: David G. Johnston (#5)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

Thank you for your detailed response. I would like to clarify my situation
further to ensure I take the appropriate steps.

Currently, my environment is running *PostgreSQL 15.0*. I understand that
version *15.9* contains the fix for CVE-2024-10979, as mentioned in the
release notes.

Given that I am not using the *PL/Perl* extension in my environment, I
wanted to ask:

- Is it still mandatory to upgrade specifically to version *15.9*, or
would remaining on version *15.0* suffice in this case?

I appreciate your guidance on whether this upgrade is necessary,
considering the specifics of my setup.

Thank you for your time and support.

On Fri, 22 Nov 2024 at 09:39, David G. Johnston <david.g.johnston@gmail.com>
wrote:

Show quoted text

On Thursday, November 21, 2024, Subhash Udata <subhashudata@gmail.com>
wrote:

Thank you for your response regarding the affected versions of
PostgreSQL. I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*. However,
your reply states that any version greater than 13+ should suffice.

Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13

It was literally just reported and fixed. If you are on a supported
release of PostgreSQL you have the fix. If you are not, you don’t.

At this point only major versions 13+ are supported.

Upgrading to an unsupported minor release is never recommended.

The fact you are on version 11 means you should not expect an answer to
the question whether this newly discovered CVE affects you - that would be
expecting support for a long-unsupported version.

Which of the 5 currently supported releases you should upgrade to is a
decision you need to make given your circumstances.

David J.

#7Tom Lane
tgl@sss.pgh.pa.us
In reply to: David G. Johnston (#5)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

"David G. Johnston" <david.g.johnston@gmail.com> writes:

On Thursday, November 21, 2024, Subhash Udata <subhashudata@gmail.com>
wrote:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*. However,
your reply states that any version greater than 13+ should suffice.
Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13

Minor versions earlier than those do not contain the fix.

The fact you are on version 11 means you should not expect an answer to the
question whether this newly discovered CVE affects you - that would be
expecting support for a long-unsupported version.

The Postgres security team does not ordinarily test out-of-support
branches, so no official answer to that will be forthcoming.
Unofficially, however, I have no doubt that this bug is quite ancient.

regards, tom lane

#8Adrian Klaver
adrian.klaver@aklaver.com
In reply to: Subhash Udata (#4)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On 11/21/24 19:57, Subhash Udata wrote:

Hi Adrian,

Thank you for your response regarding the affected versions of
PostgreSQL. I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*. However,
your reply states that any version greater than 13+ should suffice.

Any major version 13+. Postgres uses a X.x numbering scheme where X is
major version and x is minor version. If you go here:

https://www.postgresql.org/support/versioning/

you will see that translates to in terms of support. If you move to 13.x
you will have one more year before you would need to move to a newer
version. It is up to you to decide if that is okay or whether you want
to move a version that is newer to have more time to plan the next move.
In either case you should use the latest minor release that is current
at the time. Minor releases are bug/security fixes and it is important
that you keep up with them. The latest round of minor releases where
done yesterday and that is what you should be installing.

Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13?

Your guidance will help us determine the appropriate upgrade path for
our environment.

Thank you for your time and assistance.

On Thu, 21 Nov 2024 at 12:24, Adrian Klaver <adrian.klaver@aklaver.com
<mailto:adrian.klaver@aklaver.com>> wrote:

On 11/20/24 22:44, 김주연 wrote:

Hello, I am currently using PostgreSQL 11.10 and would like to

know if

the CVE-2024-10979 vulnerability affects this version.

Postgres 11 is past EOL, see:

https://www.postgresql.org/support/versioning/
<https://www.postgresql.org/support/versioning/&gt;

If it does impact my version, I would like to know which version I
should upgrade to.

Any version from 13+.

--
Adrian Klaver
adrian.klaver@aklaver.com <mailto:adrian.klaver@aklaver.com>

--
Adrian Klaver
adrian.klaver@aklaver.com

#9Ron
ronljohnsonjr@gmail.com
In reply to: Subhash Udata (#6)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

15.0 is missing TWO YEARS of bug fixes.
https://www.postgresql.org/docs/release/

And It's your database, not ours. Plus, we aren't the Version Police that
knock your head with a billy club if you don't upgrade.

Patching takes 10 minutes, and any good DBA will keep his or her systems as
patched as his organization will allow.

On Thu, Nov 21, 2024 at 11:31 PM Subhash Udata <subhashudata@gmail.com>
wrote:

Thank you for your detailed response. I would like to clarify my situation
further to ensure I take the appropriate steps.

Currently, my environment is running *PostgreSQL 15.0*. I understand that
version *15.9* contains the fix for CVE-2024-10979, as mentioned in the
release notes.

Given that I am not using the *PL/Perl* extension in my environment, I
wanted to ask:

- Is it still mandatory to upgrade specifically to version *15.9*, or
would remaining on version *15.0* suffice in this case?

I appreciate your guidance on whether this upgrade is necessary,
considering the specifics of my setup.

Thank you for your time and support.

On Fri, 22 Nov 2024 at 09:39, David G. Johnston <
david.g.johnston@gmail.com> wrote:

On Thursday, November 21, 2024, Subhash Udata <subhashudata@gmail.com>
wrote:

Thank you for your response regarding the affected versions of
PostgreSQL. I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a fix for
CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and 12.21*.
However, your reply states that any version greater than 13+ should suffice.

Could you please confirm if upgrading to one of the specific versions
listed above is mandatory, or is it acceptable to upgrade to any version
higher than 13

It was literally just reported and fixed. If you are on a supported
release of PostgreSQL you have the fix. If you are not, you don’t.

At this point only major versions 13+ are supported.

Upgrading to an unsupported minor release is never recommended.

The fact you are on version 11 means you should not expect an answer to
the question whether this newly discovered CVE affects you - that would be
expecting support for a long-unsupported version.

Which of the 5 currently supported releases you should upgrade to is a
decision you need to make given your circumstances.

David J.

--
Death to <Redacted>, and butter sauce.
Don't boil me, I'm still alive.
<Redacted> lobster!

#10Adrian Klaver
adrian.klaver@aklaver.com
In reply to: Subhash Udata (#6)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On 11/21/24 20:31, Subhash Udata wrote:

Thank you for your detailed response. I would like to clarify my
situation further to ensure I take the appropriate steps.

Currently, my environment is running *PostgreSQL 15.0*. I understand
that version *15.9* contains the fix for CVE-2024-10979, as mentioned in
the release notes.

Whoa, I thought the topic of discussion from your first post and the
email subject was:

"I am currently using PostgreSQL 11.10 and would like to know if the
CVE-2024-10979 vulnerability affects this version."

Given that I am not using the *PL/Perl* extension in my environment, I
wanted to ask:

* Is it still mandatory to upgrade specifically to version *15.9*, or
would remaining on version *15.0* suffice in this case?

I appreciate your guidance on whether this upgrade is necessary,
considering the specifics of my setup.

The upgrades fixed more then this issue, so yes you should upgrade for
all the reasons listed in the release notes for 15.1 to 15.10.

Thank you for your time and support.

On Fri, 22 Nov 2024 at 09:39, David G. Johnston
<david.g.johnston@gmail.com <mailto:david.g.johnston@gmail.com>> wrote:

On Thursday, November 21, 2024, Subhash Udata
<subhashudata@gmail.com <mailto:subhashudata@gmail.com>> wrote:

Thank you for your response regarding the affected versions of
PostgreSQL. I have a follow-up question for clarification:

The PostgreSQL documentation mentions that the versions with a
fix for CVE-2024-10979 are *17.1, 16.5, 15.9, 14.14, 13.17, and
12.21*. However, your reply states that any version greater than
13+ should suffice.

Could you please confirm if upgrading to one of the specific
versions listed above is mandatory, or is it acceptable to
upgrade to any version higher than 13

It was literally just reported and fixed.  If you are on a supported
release of PostgreSQL you have the fix.  If you are not, you don’t.

At this point only major versions 13+ are supported.

Upgrading to an unsupported minor release is never recommended.

The fact you are on version 11 means you should not expect an answer
to the question whether this newly discovered CVE affects you - that
would be expecting support for a long-unsupported version.

Which of the 5 currently supported releases you should upgrade to is
a decision you need to make given your circumstances.

David J.

--
Adrian Klaver
adrian.klaver@aklaver.com

#11David G. Johnston
david.g.johnston@gmail.com
In reply to: Subhash Udata (#6)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On Thursday, November 21, 2024, Subhash Udata <subhashudata@gmail.com>
wrote:

Currently, my environment is running *PostgreSQL 15.0*. I understand that
version *15.9* contains the fix for CVE-2024-10979, as mentioned in the
release notes.

Given that I am not using the *PL/Perl* extension in my environment

IIUC, any user that can execute “create extension plperl” in a database
they are connected to (or, it having been installed, users that have been
granted usage on the language) can exploit this vulnerability. Whether
that is possible in your environment is something you’d need to determine.

I believe this particular detail probably should have been part of the
release announcement but was not.

In any case if you aren’t willing to update consistently you really
shouldn’t be deploying .0 releases.

David J.

#12Laurenz Albe
laurenz.albe@cybertec.at
In reply to: Subhash Udata (#6)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On Fri, 2024-11-22 at 10:01 +0530, Subhash Udata wrote:

Currently, my environment is running PostgreSQL 15.0. I understand that version
15.9 contains the fix for CVE-2024-10979, as mentioned in the release notes.
Given that I am not using the PL/Perl extension in my environment, I wanted to ask:
 * Is it still mandatory to upgrade specifically to version 15.9, or would
remaining on version 15.0 suffice in this case?
I appreciate your guidance on whether this upgrade is necessary, considering the
specifics of my setup.

If you don't use PL/Perl, you are not affected by that security vulnerability.

I wonder what you mean by "mandatory".

We won't fine or punish you if you don't update PostgreSQL, but perhaps it
would make your employer unhappy. If you stay on 15.0, you will be subject to
thirteen other security vulnerabilities (if I counted right), and you may end
up with corrupted GIN and BRIN indexes. Additionally, you will be subject to
countless known bugs that have been fixed since.

You should *always* update to the latest minor release shortly after it is
released. Everything else is negligent.

Yours,
Laurenz Albe

#13David G. Johnston
david.g.johnston@gmail.com
In reply to: Adrian Klaver (#10)

On Thursday, November 21, 2024, Adrian Klaver <adrian.klaver@aklaver.com>
wrote:

On 11/21/24 20:31, Subhash Udata wrote:

Thank you for your detailed response. I would like to clarify my
situation further to ensure I take the appropriate steps.

Currently, my environment is running *PostgreSQL 15.0*. I understand that
version *15.9* contains the fix for CVE-2024-10979, as mentioned in the
release notes.

Whoa, I thought the topic of discussion from your first post and the email
subject was:

"I am currently using PostgreSQL 11.10 and would like to know if the
CVE-2024-10979 vulnerability affects this version."

No, I just think Subhash hijacked this thread. At least the email address
of the OP is a different one.

David J.

#14Adrian Klaver
adrian.klaver@aklaver.com
In reply to: David G. Johnston (#13)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On 11/21/24 20:53, David G. Johnston wrote:

On Thursday, November 21, 2024, Adrian Klaver <adrian.klaver@aklaver.com
<mailto:adrian.klaver@aklaver.com>> wrote:

On 11/21/24 20:31, Subhash Udata wrote:

Thank you for your detailed response. I would like to clarify my
situation further to ensure I take the appropriate steps.

Currently, my environment is running *PostgreSQL 15.0*. I
understand that version *15.9* contains the fix for
CVE-2024-10979, as mentioned in the release notes.

Whoa, I thought the topic of discussion from your first post and the
email subject was:

"I am currently using PostgreSQL 11.10 and would like to know if the
CVE-2024-10979 vulnerability affects this version."

No, I just think Subhash hijacked this thread.  At least the email
address of the OP is a different one.

Oops missed that, now it makes sense.

David J.

--
Adrian Klaver
adrian.klaver@aklaver.com

#15Matthias Apitz
guru@unixarea.de
In reply to: Laurenz Albe (#12)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

El día viernes, noviembre 22, 2024 a las 05:52:34 +0100, Laurenz Albe escribió:

On Fri, 2024-11-22 at 10:01 +0530, Subhash Udata wrote:

Currently, my environment is running PostgreSQL 15.0. I understand that version
15.9 contains the fix for CVE-2024-10979, as mentioned in the release notes.
Given that I am not using the PL/Perl extension in my environment, I wanted to ask:
 * Is it still mandatory to upgrade specifically to version 15.9, or would
remaining on version 15.0 suffice in this case?
I appreciate your guidance on whether this upgrade is necessary, considering the
specifics of my setup.

If you don't use PL/Perl, you are not affected by that security vulnerability.

I wonder what you mean by "mandatory".

We won't fine or punish you if you don't update PostgreSQL, but perhaps it
would make your employer unhappy. If you stay on 15.0, you will be subject to
thirteen other security vulnerabilities (if I counted right), and you may end
up with corrupted GIN and BRIN indexes. Additionally, you will be subject to
countless known bugs that have been fixed since.

You should *always* update to the latest minor release shortly after it is
released. Everything else is negligent.

Laurenz, et all,

The company I'm working for is producer of a Library Management System
with C/C++ written servers on Linux, using ESQL/C and DBI interfaces of
PostgreSQL (and older version Sybase too) and the software is deployed
to 100++ customer installations, sometimes with limited own IT know how.

"You should *always* update ..." is nice to say, but in the described land
not easy to do. For the two released versions of our software (V7.2 and
V7.3) and the current version in development (V7.3-SP1) we plan the
following migrations of the server and client side of PostgreSQL:

under development: V7.3-SP1 (we will not support 15.9 as cluster in SP1)
used ESQL/C 15.9 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.3 (we will not support 15.9 as cluster in V7.3)
used ESQL/C 15.1 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.2 (we will not support 15.9 as cluster in V7.2)
used ESQL/C 11.4 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
13.1 --> 16.5
16.2 --> 16.5

Especially the version V7.2 (released in 2021) can't be updated on the
client side, the cluster will be migrated to 16.5. I assume that
CVE-2024-10979 affects the server side, and not the client side.

Any further comments on this?

Thanks

matthias

--
Matthias Apitz, ✉ guru@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

#16Achilleas Mantzios
a.mantzios@cloud.gatewaynet.com
In reply to: Matthias Apitz (#15)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On 11/22/24 10:00, Matthias Apitz wrote:

El día viernes, noviembre 22, 2024 a las 05:52:34 +0100, Laurenz Albe escribió:

On Fri, 2024-11-22 at 10:01 +0530, Subhash Udata wrote:

Currently, my environment is running PostgreSQL 15.0. I understand that version
15.9 contains the fix for CVE-2024-10979, as mentioned in the release notes.
Given that I am not using the PL/Perl extension in my environment, I wanted to ask:
 * Is it still mandatory to upgrade specifically to version 15.9, or would
remaining on version 15.0 suffice in this case?
I appreciate your guidance on whether this upgrade is necessary, considering the
specifics of my setup.

If you don't use PL/Perl, you are not affected by that security vulnerability.

I wonder what you mean by "mandatory".

We won't fine or punish you if you don't update PostgreSQL, but perhaps it
would make your employer unhappy. If you stay on 15.0, you will be subject to
thirteen other security vulnerabilities (if I counted right), and you may end
up with corrupted GIN and BRIN indexes. Additionally, you will be subject to
countless known bugs that have been fixed since.

You should *always* update to the latest minor release shortly after it is
released. Everything else is negligent.

Laurenz, et all,

The company I'm working for is producer of a Library Management System
with C/C++ written servers on Linux, using ESQL/C and DBI interfaces of
PostgreSQL (and older version Sybase too) and the software is deployed
to 100++ customer installations, sometimes with limited own IT know how.

"You should *always* update ..." is nice to say, but in the described land
not easy to do. For the two released versions of our software (V7.2 and
V7.3) and the current version in development (V7.3-SP1) we plan the
following migrations of the server and client side of PostgreSQL:

under development: V7.3-SP1 (we will not support 15.9 as cluster in SP1)
used ESQL/C 15.9 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.3 (we will not support 15.9 as cluster in V7.3)
used ESQL/C 15.1 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.2 (we will not support 15.9 as cluster in V7.2)
used ESQL/C 11.4 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
13.1 --> 16.5
16.2 --> 16.5

Why not decouple client libs from the server ? i.e. psql works great
with many versions greater than its own. And certainly with same major
versions. You could retain the same client libs and just upgrade the
PgSQL server to the highest minor version of the major version that you
support.

Granted, I am coming from JDBC/psql land but still those restrictions
above just seem too much.

Of course SQL correctness from version to version (such as "trailing
junk", standard_conforming_strings, etc ..) and performance are tasks
that has to be done, you can't skip those. But IMHO the server version
in the general case is independent or should be independent from the
app. We recently migrated from 10.23 -> 16.4 with slight bruises (almost
6+ months preparation by me and 3-4 months preparation from the dept team).

Just my 5 cents.

Show quoted text

Especially the version V7.2 (released in 2021) can't be updated on the
client side, the cluster will be migrated to 16.5. I assume that
CVE-2024-10979 affects the server side, and not the client side.

Any further comments on this?

Thanks

matthias

#17Matthias Apitz
guru@unixarea.de
In reply to: Achilleas Mantzios (#16)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

El día viernes, noviembre 22, 2024 a las 11:01:29 +0200, Achilleas Mantzios - cloud escribió:

under development: V7.3-SP1 (we will not support 15.9 as cluster in SP1)
used ESQL/C 15.9 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.3 (we will not support 15.9 as cluster in V7.3)
used ESQL/C 15.1 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
15.1 --> 16.5
16.2 --> 16.5

released: V7.2 (we will not support 15.9 as cluster in V7.2)
used ESQL/C 11.4 (i.e. PostgreSQL client side)
migrate the used cluster/database 'from' --> 'to'
13.1 --> 16.5
16.2 --> 16.5

Why not decouple client libs from the server ? i.e. psql works great with
many versions greater than its own. And certainly with same major versions.
You could retain the same client libs and just upgrade the PgSQL server to
the highest minor version of the major version that you support.
...

This is exactly the plan. For all the three versions the cluster will be
migrated to 16.5 and the client side will stay for the released version
with what they currently use (11.4 or 15.1). And for the version under
development 15.9

matthias

--
Matthias Apitz, ✉ guru@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Annalena Baerbock: "We are fighting a war against Russia ..." (25.1.2023)

I, Matthias, I am not at war with Russia.
Я не воюю с Россией.
Ich bin nicht im Krieg mit Russland.

#18Ron
ronljohnsonjr@gmail.com
In reply to: Achilleas Mantzios (#16)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On Fri, Nov 22, 2024 at 4:01 AM Achilleas Mantzios - cloud <
a.mantzios@cloud.gatewaynet.com> wrote:

On 11/22/24 10:00, Matthias Apitz wrote:

[snip]

Why not decouple client libs from the server ? i.e. psql works great
with many versions greater than its own. And certainly with same major
versions. You could retain the same client libs and just upgrade the
PgSQL server to the highest minor version of the major version that you
support.

Small VARs that sell turnkey solutions would rather bundle everything
together. One application version, one database version, one OS version,
one set of hardware, all bundled up and sold to a tech-illiterate customer
that doesn't employ a DBA or SysAdmin. That way, when something
stops working, you aren't guessing if it's this patch, that patch, etc etc.

Not saying that Matthias works for such a VAR, but such companies
definitely exist.

--
Death to <Redacted>, and butter sauce.
Don't boil me, I'm still alive.
<Redacted> lobster!

#19David G. Johnston
david.g.johnston@gmail.com
In reply to: Matthias Apitz (#15)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On Friday, November 22, 2024, Matthias Apitz <guru@unixarea.de> wrote:

Especially the version V7.2 (released in 2021) can't be updated on the
client side, the cluster will be migrated to 16.5. I assume that
CVE-2024-10979 affects the server side, and not the client side.

Yes, it is the server that executes procedural language code like plperl.

David J.

#20Laurenz Albe
laurenz.albe@cybertec.at
In reply to: Matthias Apitz (#15)
Re: CVE-2024-10979 Vulnerability Impact on PostgreSQL 11.10

On Fri, 2024-11-22 at 09:00 +0100, Matthias Apitz wrote:

Given that I am not using the PL/Perl extension in my environment, I wanted to ask:
 * Is it still mandatory to upgrade specifically to version 15.9, or would
    remaining on version 15.0 suffice in this case?
I appreciate your guidance on whether this upgrade is necessary, considering the
specifics of my setup.

If you don't use PL/Perl, you are not affected by that security vulnerability.

I wonder what you mean by "mandatory".

We won't fine or punish you if you don't update PostgreSQL, but perhaps it
would make your employer unhappy.  If you stay on 15.0, you will be subject to
thirteen other security vulnerabilities (if I counted right), and you may end
up with corrupted GIN and BRIN indexes.  Additionally, you will be subject to
countless known bugs that have been fixed since.

You should *always* update to the latest minor release shortly after it is
released.  Everything else is negligent.

The company I'm working for is producer of a Library Management System
with C/C++ written servers on Linux, using ESQL/C and DBI interfaces of
PostgreSQL (and older version Sybase too) and the software is deployed
to 100++ customer installations, sometimes with limited own IT know how.

And you didn't plan how you intend to ship software updates to these
customers?

"You should *always* update ..." is nice to say, but in the described land
not easy to do.

If you say so. Still, that is a problem that will come to bite you
some day, as soon as your customers hit some PostgreSQL bug.

I assume that
CVE-2024-10979 affects the server side, and not the client side.

Right. I wonder why you are so keen on that vulnerability and ignore
all the others discovered since 15.0.

Any further comments on this?

No. I told you that you should update, and you explained in great
detail why you cannot. There is nothing more to say. Good luck.

Yours,
Laurenz Albe

#21Bruce Momjian
bruce@momjian.us
In reply to: Matthias Apitz (#15)
#22Greg Sabino Mullane
greg@turnstep.com
In reply to: Bruce Momjian (#21)
#23Bruce Momjian
bruce@momjian.us
In reply to: Greg Sabino Mullane (#22)
#24Adrian Klaver
adrian.klaver@aklaver.com
In reply to: Bruce Momjian (#23)
#25Ron
ronljohnsonjr@gmail.com
In reply to: Bruce Momjian (#21)
#26Bruce Momjian
bruce@momjian.us
In reply to: Ron (#25)
#27Ron
ronljohnsonjr@gmail.com
In reply to: Bruce Momjian (#26)