LWN.net Logo

Vulnerability handling in the PostgreSQL project

April 9, 2013

This article was contributed by Josh Berkus

On April 4th, 2013, the PostgreSQL project announced a security vulnerability (CVE-2013-1899) and resulting patch for one of the worst security holes in project history. According to the project web page, "this is the first security issue of this magnitude since 2006." Given the broad usage of PostgreSQL, the update caused quite a stir. Even more controversy was created by Heroku's early deployment of the fix. The PostgreSQL project's handling of this security release raises some important questions about how open source projects should handle this kind of release.

Discovery

On March 12th, Mitsumasa Kondo and Kyotaro Horiguchi of NTT Open Source Software Center (of Japan) reported an issue to the PostgreSQL security mailing list. They had uncovered the issue while doing security testing of PostgreSQL, which is one of the ways that NTT has assisted the PostgreSQL project over the last several years. They immediately noted the potential of this vulnerability to destroy data using nothing more than a psql client connection.

In general, this is typical of how security vulnerabilities in PostgreSQL are discovered. Most are found by existing code contributors. Over the last few years, an increasing number of security vulnerabilities have been discovered by professional security researchers from organizations such as NTT, Secunia, the Japanese government, and the Red Hat security team. This has allowed the project to find, and patch, vulnerabilities which have gone unnoticed and unremarked for years.

PostgreSQL has yet to have a major security exploit or worm known to be "in the wild" prior to a fix being available for a vulnerability. With the increasing popularity of the database system, though, it's only a matter of time before the "black hats" outrace the contributors.

Vulnerability and exploits

The core of the vulnerability is a command-line switch designed for internal use of the backend server that was not supposed to be exposed to users through the API. This switch is accessed by passing a "-r" before the database name in an initial, unauthenticated, connection to the database server, which causes PostgreSQL to instead pipe the session output (generally an error message) directly to a file with the same name as the supplied database. No database of that name needs to actually exist, so the error output can be piped to arbitrary database server files.

The vulnerability was inadvertently added by PostgreSQL lead hacker Tom Lane in the course of a general refactoring of client connection code that generally made it faster and more maintainable. Once the oversight was pointed out, members of the security team were able to quickly and easily patch the server backend code to have it ignore the unsafe switch.

The vulnerability affects PostgreSQL versions 9.0, 9.1, and 9.2. Users on version 8.4 are safe from this particular vulnerability. Users of version 8.3 and earlier are also safe, but those versions are past end-of-life (EOL), so they are missing other security fixes since they are no longer being updated by the PostgreSQL community — though distributors and other third parties may still be backporting security fixes.

First, any attacker who can reach an open PostgreSQL port (usually port 5432), can, without a valid login, cause the PostgreSQL server to shut down and refuse to restart by using the "-r" switch to append error messages and other garbage to vital database server files. This is what the project calls a "persistent denial of service" because the administrator will have to either hand-clean the files, or restore from backup, to restart the server. This exploit has a certain "time bomb" nature to it as well, since generally the effects of adding garbage to files won't be noticed until later, such as when the server is restarted next.

Additional exploits become possible if the attacker has some type of valid login. For example, if a user has a legitimate login which matches a database name (for example, user "django-prod", database "django-prod"), then they can use the "-c" switch to change a single server configuration variable with the privileges of the database superuser for the duration of their database session. This privilege escalation becomes useful to an attacker mainly if they also have other types of access to the server. Particularly, if the attacker also has filesystem access, even to a "tmp" directory, they could use the superuser configuration exploit to dynamically load a C library, thus permitting the execution of arbitrary C code.

Users whose databases are protected from untrusted networks are generally safe from these exploits. So in addition to patching PostgreSQL, effective use of network security and firewalls greatly reduces the impact of the vulnerability. Additionally, tight control of login credentials and use of advanced security options like SELinux limit the amount of damage an attacker can do. It is important to note that settings in pg_hba.conf, the Postgres access control file, are not effective protection against the denial-of-service vulnerability, although modifying postgresql.conf to not listen on external IP addresses is.

Impact

Several years ago, PostgreSQL was primarily used on back-office servers that were not connected directly to the Internet, so a vulnerability like this one would not have been such a major issue. Today, however, PostgreSQL is run on thousands of "cloud" servers with public IP addresses, most notably ones run by application hosting companies such as Heroku, EngineYard, and VMware Cloud Foundry. Heroku is the largest of these "Database As A Service" (DBAAS) companies; it does not disclose user numbers, but is assumed to have hundreds of thousands of users based on the level of adoption shown when it was acquired by Salesforce.com in 2010. Individual web hosts are running with PostgreSQL exposed as well. This scan from Shodan shows over 300,000 PostgreSQL servers exposed to the Internet, 40% of them at Polish megahost Home.PL.

As a result, this security vulnerability risks large-scale denial-of-service to thousands of web applications, and worse problems if combined with a second security weakness elsewhere in users' applications. That made it imperative to get users to update their PostgreSQL installations as soon as the vulnerability was disclosed.

Announcement process

The last time the PostgreSQL project had a remotely exploitable vulnerability of this magnitude was the "backslash escape" issue in 2006 (CVE-2006-2314). As a result, the vast majority of current PostgreSQL users have no experience with major security holes in the DBMS. The PostgreSQL team was a bit "rusty" when it comes to this kind of security issue as well. Simply put, the last time the project had a issue this serious, there were a lot fewer PostgreSQL users.

PostgreSQL releases its own binary packages for several platforms, in particular Red Hat variants, Debian, Ubuntu, and Windows. This is done by a large volunteer team of packagers who generally get access to the new code a few days before the release date in order to create binaries. Recently, the project has begun adding the major DBAAS platforms to the packagers list, since those companies do their own builds and distribute to a large, public user base.

The first notice which the public received on the bug was on March 26th when Tom Lane notified the PostgreSQL developer list that an update was coming on April 4th which patches "a seriously nasty security problem in recent releases of Postgres." This was followed by a notice to the general public on the 29th, and closing the main PostgreSQL git server to the public on the 31st, which was also the day the packagers started working with the new code. The final release came out April 4th at 1500 UTC.

In general, this process went as planned. "This security update has been coordinated and handled in an exemplary manner, everyone got told and prepared well in advance," said Martin Pitt of Canonical.

As I will document below, there are arguments as to whether the procedure should be revised, but messages and updates went out as intended — except for one thing.

The Heroku issue

The last time the PostgreSQL team executed this high-risk security release procedure, DBAAS was barely a gleam in a technology forecaster's eye. Thus the release procedure didn't take into account how building for DBAAS is different from rolling RPMs.

On April 1st, Heroku posted a status update telling users that they would have a unscheduled sixty-second outage to update customer databases between April 1st and 3rd. Users and reporters easily put this together with the PostgreSQL project announcement to figure out that Heroku was deploying the security update early, ahead of its official availability. This caused some significant unrest among users who felt that their security was being ignored in favor of large vendors.

Heroku had been permitted to update early, with full knowledge of the PostgreSQL security team, because of their large size and high level of vulnerability. Developers also felt that Heroku would be able to supply feedback about the security update, and report on any incompatibilities or regressions introduced by the code patches. However, they had not anticipated that the nature of DBAAS would make this early deployment effectively public.

Other DBAAS vendors, such as EngineYard, EnterpriseDB, Gandi.net, and VMware, were also given information and code in order to have builds ready early, but did not deploy until April 4th.

Security releases, disclosure, and open source

This entire process and some of the complaints about it have raised a number of questions in the PostgreSQL community and other communities on how to handle high-exposure security vulnerabilities. The practices, conventions, and values of proprietary software don't necessarily work for open source projects, so there are a number of questions our communities need to resolve. Since the answers to many of these questions are far from clear-cut, we took them to a group of open source project leaders to discuss policy and procedures for security releases.

Jacob Kaplan-Moss of the Django Project felt that the public warning about an imminent security release was "a mistake" which "fails in three ways." He explained, "First, it causes some undue angst. We all know intellectually that all software has bugs, including security issues, but that's different from knowing that there's something concretely wrong with the software you're using right now ... Second, it calls attention to the fact that some people get special treatment (Heroku in your case). Finally, I don't actually think the extra pre-notice helps. Knowing that this was coming on Thursday didn't really change things; we would have dropped everything anyway."

Ben Laurie of the Apache Foundation and the OpenSSL project pointed out the danger, "It's amazing what people work out given minimal clues."

Yet in this particular case, the forewarning of the upcoming security release generated extra press coverage, which arguably caused many more users to be aware that there was an update than otherwise would have been.

Another debatable point is differentiating major and minor security releases. The PostgreSQL project has been in the habit of doing this, as has the Mozilla project. But Karl Fogel, author of Producing Open Source Software, took exception to it, saying, "I think it's best to handle all security releases using basically the same procedure." Kaplan-Moss agreed with the viewpoint, pointing out, "Risk is the product of two factors: ease of exploit, and impact of exploit. As maintainers, we can do a good job estimating the first factor, but the second is going to differ based on use case."

Dave Page of the PostgreSQL Core Team, however, argued practicality: "We can't treat every security issue the same way. Consider the effort and number of people who had to drop everything this time ... We just can't expect that level of support for every minor issue that crops up, yet we need to expect it for a category A like this one."

The biggest area where open source projects differ in handling their security update notifications has to do with the question of advance notice to large, important, or especially vulnerable users. The PostgreSQL Project's approach of informing only packagers of public builds is quite common, and the same one (sometimes) used by Kernel.org. Other projects do it differently, such as the Django Project, which has a private list and formal policy for early notification users.

"I think large services whose operators you trust can get advance notice. But you control that list, and you never make it public -- otherwise people start asking 'Why am I not on the list when so-and-so is?'," Fogel suggested. "There may be large sites where you can prevent a lot of damage if you trust the admins to handle the news discreetly and you handle it discreetly yourselves.

On the other hand, Laurie didn't find this to be a good idea at all. He said, "Everyone thinks they're special. They're all wrong. The public have as much, or more, right to know than special interests."

Within the PostgreSQL community, the issue of advance notice for critical users is likely to be debated for some time. PostgreSQL is currently in the process of revising its security release policy based on lessons learned from this release.

Release

Regardless of people's perspectives on the PostgreSQL security release process, the updates were released on April 4th. This included versions 9.2.4, 9.1.9, 9.0.13 and 8.4.17, updating all maintained branches. Because of the earlier controversy and attention, this update release received considerably more press coverage than a standard PostgreSQL update.

Of course, in addition to the security issue discussed above, the update also fixes a number of other minor PostgreSQL issues, including four other security issues. CVE-2013-1900 is an issue weakening key security in the optional pgcrypto extension. CVE-2013-1901 is a permissions bug which allows a regular user to interfere with concurrently executing database backups. The release also fixed two security issues with the graphical installers for Linux and Mac OS X, CVE-2013-1903 and CVE-2013-1902. The update also includes a number of non-security bug fixes, including two issues which can cause replication failover to not work properly.

Within two hours of the release announcement, Metasploit had posted a test for differentiating patched from unpatched servers. Other scanner projects have followed suit, so it should be possible for administrators to be sure they've patched their systems.

Schemaverse compromised

Within a day of the release announcement, we had our first actual compromise of a public system, courtesy of Schemaverse, which is a space-combat database-security training game invented by Josh McDougall for DefCon. Since successfully attacking the database is an acceptable way to win the game in Schemaverse, McDougall decided to hold back updating:

I wanted to leave the public database unpatched for a couple days to see how long it would take somebody to compromise it after the announcement of a serious vulnerability. About 24 hours after the release, this little file showed up in my /data directory.

[...]

    -rw-------. 1 postgres postgres   535 Apr  5 05:33 SECURITY_RISK_PLEASE_UPGRADE_TO_9.2.4_NOW

So, a white hat was behind it, but it was a break-in nonetheless. And it shows the danger of the vulnerability.

Conclusion

As of April 8th, no PostgreSQL users have reported being compromised as a result of the vulnerability, and the PostgreSQL developers hope that they made enough noise to get the vast majority of users to update before the exploits become common scripts. They also hope to not need to practice their security release procedure again for some time, but are revising their security policy and preparing for the worst.

Certainly, we can expect, in any given week, a major security vulnerability from some key open source project. Our industry and communities still need to improve and refine our ways of handling security vulnerabilities, patch releases, and notifications. Perhaps we can do better than the proprietary software industry with regard to sharing information, ideas, and best practices.

In the meantime, patch your PostgreSQL servers!

[ Josh Berkus is a member of the PostgreSQL Core Team. ]


(Log in to post comments)

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 16:15 UTC (Tue) by ewan (subscriber, #5533) [Link]

There's an interesting hypothetical case not covered here which is how you handle the question of advance notice to 'special cases' if some of them were to be on the security team.

If (for example) DBAAS provider 'X' has an employee on the Postgres security team, does that affect what the project tells competing providers 'Y' and 'Z', and what are the expectations of the person who's both a Postgres team member, and a DBASS provider employee?

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 17:49 UTC (Tue) by jberkus (subscriber, #55561) [Link]

Ewan,

That's a good question, alright. I don't think there's a clearcut answer.

One issue is that, if Company X has a fix prepared for deployment early (even if they deploy on time) because their staff member is on the security team, then Companies Y and Z will put pressure on the project to be included on the security team. And then pretty soon the security team is 60 members and leaky as an antique rowboat.

PostgreSQL is in pretty good shape to stand up to obnoxious companies in this regard, but smaller, younger projects with fewer sponsors may have a lot more difficulty doing so.

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 19:12 UTC (Tue) by kleptog (subscriber, #1183) [Link]

FWIW I think the PostgreSQL project handled this one well.

About who gets advance notice, if it's considered normal to give packagers advance notice then I think you have to do DBAAS too. The argument for packagers is that it's useful for be able to announce the vulnerability and have packages available for users to install. With a DBAAS the users cannot install the packages themselves and so require the service to do it for them. Hence the service should be able to install the updates for the user at the same time.

What was unfortunate was that Heroku announced it was rolling out the update first. However, no children were harmed so chalk it up as a learning experience for the next time.

Vulnerability handling in the PostgreSQL project

Posted Apr 16, 2013 11:05 UTC (Tue) by fdr (subscriber, #57064) [Link]

What was wrong with announcing the maintenance?

The objectives of the embargo is to deny source, binary, or informational access (e.g. release notes) ahead of a particular time. All of these are achieved outside a rather far-fetched kind of leak from the Heroku Postgres service, so the remaining risk lies in the black swan category, not unlike any other packager. The risk taken also has upsides in getting some broad-band testing for the project and protecting a large number of PostgreSQL users.

I suppose it's possible that the maintenance *could* have been kept secret, but it doesn't really fulfill of the above goals, and so, it wasn't, and to date nobody has raised or forwarded an objection to me that anything should have been done differently there.

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 19:54 UTC (Tue) by jimparis (subscriber, #38647) [Link]

> In the meantime, patch your PostgreSQL servers!

This looks like the patch:
http://git.postgresql.org/gitweb/?p=postgresql.git;a=comm...

Interestingly, the commit the caused the bug points out another information disclosure vulnerability that appears to have been purposely ignored:
http://git.postgresql.org/gitweb/?p=postgresql.git;a=commit;...
(I wonder if that's since been fixed?)

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 21:14 UTC (Tue) by andresfreund (subscriber, #69562) [Link]

Yes it has, ea46000a40cf583401504e095ca1a49f57fa0227; both were committed in the 9.0 release cycle, so there was never a released version that disclosed this.

I'd say it was pretty harmless as far as information disclosures go anyway.

There is a big difference between a DBAAS update and source release

Posted Apr 9, 2013 19:57 UTC (Tue) by dlang (✭ supporter ✭, #313) [Link]

a DBAAS update gives very little information to the black hats. while releasing the source to everyone gives the black hats the roadmap to create an exploit.

Yes, the black hats can try to figure out what's different in the DBAAS behavior, but unless they trip over the exploit (and apparently nobody has for many years already), it doesn't really help them.

Having a DBAAS vendor being willing to be an early tester of an update like this is also extremely valuable to the Postgres project. Think about how big the mess would be if they released the source (and therefor the details needed to create an exploit), and then when people started running with production loads they discovered that the fix had some nasty side effect that broke things. Companies would have the choice of shutting down or running with a known exploitable hole.

Yes, if you have too many people involved, the details will leak out and you can never be absolutly shure that they haven't already done so (remember, two can keep a secret only if one of them is dead)

On the other hand, getting the big players in an area the needed information early gets more users protected faster, so overall it ends up being quite valuable.

And as for the statement from the one company that they didn't need any advance warning, they would have dropped everything anyway, the advanced warning (even a few days worth) means that you can much more gracefully postpone work, and notify the affected people. You also have a much easier time avoiding the situation where you have just done a major update to other things in your system and now don't know if the problem you run into is caused by that other update or by the postgres update

There is a big difference between a DBAAS update and source release

Posted Apr 10, 2013 0:22 UTC (Wed) by ringerc (subscriber, #3071) [Link]

"A DBAAS update gives very little information to the black hats."

You'd be surprised. Some DBAAS companies offer direct shell access to their boxes for certain big customers and their consultants; I know a couple of people with such access to a big DBAAS vendor's systems personally. One has explicitly said it'd be trivial for him to reverse engineer the details of the recent problem by comparing the pre- and post-patch PostgreSQL binaries.

That said, most Heroku users do not have such access. You can't just sign up and get access to the PostgreSQL server binaries on Heroku, all you can get to is `libpq.so` via `heroku run bash`.

There is a big difference between a DBAAS update and source release

Posted Apr 10, 2013 12:07 UTC (Wed) by ortalo (subscriber, #4654) [Link]

Probably true, but you have to compensate decisions with the kind of attackers you want to protect against, too.
(Remember Mitsumasa Kondo and Kyotaro Horiguchi found the vulnerability initially with no prior information *at all*...;-)

There is a big difference between a DBAAS update and source release

Posted Apr 10, 2013 16:17 UTC (Wed) by jberkus (subscriber, #55561) [Link]

That's true. For example, EngineYard offers shell access. For that reason, we asked them not to deploy until a couple hours before the official announcement (which they complied with).

There is a big difference between a DBAAS update and source release

Posted Apr 10, 2013 17:39 UTC (Wed) by spender (subscriber, #23067) [Link]

Some interesting assumptions here regarding the actions of blackhats.

In my view, this kind of embargoing just makes everyone involved in the embargo valuable targets for blackhats. The rewards for owning a postgresql developer would then pay off every time embargoing is done, guaranteeing said blackhat (and whoever else they care to tell/sell the info to) will be able to attack other systems unimpeded for the duration of all future embargoes.

If done correctly, you'll never hear about it. Then again, you seem to buy into the whole notion of "if I didn't hear about it, it didn't happen", so the public "feeling" secure (all that matters, right?) is preserved.

How quickly we seem to have forgotten:
http://www.theregister.co.uk/2011/08/31/linux_kernel_secu...
"The infection occurred no later than August 12 and wasn't detected for another 17 days, according to an email John "'Warthog9" Hawley, the chief administrator of kernel.org, sent to developers on Monday. It said a trojan was found on the personal machine of kernel developer H Peter Anvin and later on the kernel.org servers known as Hera and Odin1. A secure shell client used to remotely access servers was modified, and passwords and user interactions were logged during the compromise."

-Brad

There is a big difference between a DBAAS update and source release

Posted Apr 11, 2013 0:17 UTC (Thu) by jberkus (subscriber, #55561) [Link]

Brad,

Yeah, we've discussed that too -- it's another reason to keep the embargo list as small as possible. Right now, the embargoees are required to be contributors (security hackers and packagers), most of them with years of involvement in the project before they're let "inside". This makes things cost-prohibitive for a black hat as a business proposition. If we broadened the embargo list, though, it might not be so costly.

Your point about leakage via malware is even more apropos; that shows how, the larger the list, the larger the risk, no matter *how* much you trust the people on the list.

Vulnerability handling in the PostgreSQL project

Posted Apr 9, 2013 21:48 UTC (Tue) by jengelh (subscriber, #33263) [Link]

>We just can't expect that level of support for every minor issue that crops up, yet we need to expect it for a category A like this one."

The act of generally not giving any classification like “major” or “minor” for fixes seems to work well for the Linux stable kernel series however.

Vulnerability handling in the PostgreSQL project

Posted Apr 10, 2013 1:49 UTC (Wed) by spender (subscriber, #23067) [Link]

Does it? Says who? How would you even know whether it's working well or not? I've got all the hard evidence here, and I have to tell you, it's not working. I took a five second look and saw two 1+ month-old vulnerabilities with already allocated CVEs that still have yet to be fixed in 3.2 (hint: KVM). Five more seconds, leaking of keying material in SCTP, not fixed in 3.2. Few more seconds, mtdchar overflow from 2012 remains unfixed in 3.2. I can go on and on. But go ahead and keep repeating that the system works.

-Brad

Vulnerability handling in the PostgreSQL project

Posted Apr 10, 2013 5:08 UTC (Wed) by pzb (subscriber, #656) [Link]

How do 3.0 and 3.4 compare? 3.2 has a different maintainer, so I wonder if what you are observing has to do more with maintainer than anything else.

Vulnerability handling in the PostgreSQL project

Posted Apr 10, 2013 9:56 UTC (Wed) by dan_a (subscriber, #5325) [Link]

But would the 3.2 maintainer have behaved differently if the vulnerabilities were marked as minor and major?

Vulnerability handling in the PostgreSQL project

Posted Apr 10, 2013 11:44 UTC (Wed) by spender (subscriber, #23067) [Link]

No different -- I can tell you the root of the problem: all the vulnerabilities I mentioned did not have -stable cc'd, though they clearly affected earlier kernels.

Just judging from mails I get cc'd on, fixes of mine that Kees submits upstream and marks for -stable generally are applied quickly. If vuln fixes don't get marked for -stable, however, they might as well not exist. The response has always been: "it's the responsibility of the committer to mention when a fix needs to be backported", but if that responsibility continues to be ignored (as it is), then the response shouldn't be to repeat the same thing and expect different results. Just this morning I took a look at some fixes from Al and others that I confirmed should be backported to earlier kernels, but have not been marked for -stable.

There should be more of a watchdog-style approach instead of continuing to assume committers who already won't mark commits with security relevancy will mark them properly for -stable.

-Brad

Vulnerability handling in the PostgreSQL project

Posted Apr 10, 2013 12:27 UTC (Wed) by jengelh (subscriber, #33263) [Link]

My intent was not to spark a discourse about unfixed vulnerabilities, but instead remark that people seem to have accepted the provided reasoning that developers/maintainers do not necessarily want to spend time on assessing all impact aspects of a particular bug (that's for security people to do) and to produce severity ratings for inclusion in the commit message of the corresponding fix, culminating in the use of the "prominent catchphrase" “All users must upgrade” to express just that.

Vulnerability handling in the PostgreSQL project

Posted Apr 14, 2013 23:57 UTC (Sun) by BenHutchings (subscriber, #37955) [Link]

I took a five second look and saw two 1+ month-old vulnerabilities with already allocated CVEs that still have yet to be fixed in 3.2 (hint: KVM).

I expect you're thinking of some of these:

These are not in any stable branch as there was no cc or subsequent request. I may well request these myself (they are already in Debian and I don't think we've had any regressions reported).

Five more seconds, leaking of keying material in SCTP, not fixed in 3.2.

Do you mean net: sctp: sctp_auth_key_put: use kzfree instead of kfree? That isn't a leak in itself, though it does appear to be worth fixing. Oddly the two similar fixes made at the same time did get into the extant 3.x.y branches.

Few more seconds, mtdchar overflow from 2012 remains unfixed in 3.2.

Which would be mtdchar: fix offset overflow detection. Again not cc'd or requested. This is mitigated by the fact that mtdchar devices are not available to unprivileged users and indeed don't exist in most systems.

I can go on and on.

Please do, but stable@vger.kernel.org is a better place to send these.

But go ahead and keep repeating that the system works.

I'm not about to defend it as I'm not convinced it's working so well. But I don't think we can ever expect developers in general to recognise the full security implications of a bug even when they fix it. It does require security-minded people to aid the stable maintenance process by nominating such fixes.

Vulnerability handling in the PostgreSQL project

Posted Apr 15, 2013 1:06 UTC (Mon) by spender (subscriber, #23067) [Link]

Hi Ben,

Correct on all counts. As we both agree, it requires additional people in the process to make sure security-relevant commits are backported to affected kernels. However, I hope you can accept that the foolish security stance of upstream results in many of those security-minded people not wanting to assist in rectifying a problem upstream's security stance has in part created. That said, nothing stops anyone else (like Kees Cook) from monitoring my changelogs containing upstream commit ids and nominating them for -stable inclusion. I will just never be doing this work myself.

-Brad

Vulnerability handling in the PostgreSQL project

Posted Apr 11, 2013 8:40 UTC (Thu) by skx (subscriber, #14652) [Link]

You can read about exploiting this bug here, where the author dissects the flaw in a little more detail.

"We can't treat every security issue the same way."

Posted Apr 11, 2013 22:41 UTC (Thu) by brouhaha (subscriber, #1698) [Link]

The article quotes Dave Page as saying:

We can't treat every security issue the same way. Consider the effort and number of people who had to drop everything this time ... We just can't expect that level of support for every minor issue that crops up, yet we need to expect it for a category A like this one.

One would think this to be obvious enough to not even need to be stated, yet apparently there are people who disagree.

A similar statement was made by former US National Security Advisor McGeorge Bundy:

If we guard our toothbrushes and diamonds with equal zeal, we will lose fewer toothbrushes and more diamonds.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds