PgBouncer 1.24.1 released - Fixes CVE-2025-2291
PgBouncer 1.24.1 has been released. This release fixes CVE-2025-2291, which could allow an attacker to bypass Postgres its password expiry. Such a password expiry would have been set up in Postgres using the
VALID UNTILclause. This is a security issue that affects all versions of PgBouncer. If you use bothVALID UNTILandauth_userthen you should upgrade, or change theauth_queryin your config file to the newauth_querythat is used by default in this release. If you are using a customauth_querythen you should update it be similar to the new defaultauth_queryin this release.This release also fixes PAM authentication by reverting support for
pamin the HBA file. PAM authentication was accidentally broken in 1.24.0.
See the full details in the changelog.
PgBouncer 1.24.1 has been released and addresses CVE-2025-2291, which enables attackers to circumvent Postgres' password expiration policy. This matter impacts every version of PgBouncer. Users are advised to update their configuration files to align with the new default auth_query.
