Compare commits
No commits in common. 'i8c-stream-10' and 'c9' have entirely different histories.
i8c-stream
...
c9
@ -1,4 +1,4 @@
|
|||||||
SOURCES/postgresql-10.23-US.pdf
|
SOURCES/postgresql-12.22.tar.bz2
|
||||||
SOURCES/postgresql-10.23.tar.bz2
|
SOURCES/postgresql-13.18-US.pdf
|
||||||
SOURCES/postgresql-9.2.24.tar.bz2
|
SOURCES/postgresql-13.18.tar.bz2
|
||||||
SOURCES/postgresql-setup-8.7.tar.gz
|
SOURCES/postgresql-setup-8.6.tar.gz
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
a416c245ff0815fbde534bc49b0a07ffdd373894 SOURCES/postgresql-10.23-US.pdf
|
4f0a2bfcdaa6b370029353d7a01451d7a8282750 SOURCES/postgresql-12.22.tar.bz2
|
||||||
2df7b4b3751112f3cb543c3ea81e45531bebc7a1 SOURCES/postgresql-10.23.tar.bz2
|
955d79c1020409995834540260981b95e269b980 SOURCES/postgresql-13.18-US.pdf
|
||||||
63d6966ccdbab6aae1f9754fdb8e341ada1ef653 SOURCES/postgresql-9.2.24.tar.bz2
|
e314353cf318ce5e33dfb73a91cd2ac9553c9885 SOURCES/postgresql-13.18.tar.bz2
|
||||||
fb97095dc9648f9c31d58fcb406831da5e419ddf SOURCES/postgresql-setup-8.7.tar.gz
|
9e12ee26bf41d3831f83049b51ae5da76de2ce12 SOURCES/postgresql-setup-8.6.tar.gz
|
||||||
|
@ -1,13 +0,0 @@
|
|||||||
diff --git a/contrib/dblink/expected/dblink.out b/contrib/dblink/expected/dblink.out
|
|
||||||
index 6ceabb453c..6516d4f131 100644
|
|
||||||
--- a/contrib/dblink/expected/dblink.out
|
|
||||||
+++ b/contrib/dblink/expected/dblink.out
|
|
||||||
@@ -879,7 +879,7 @@ $d$;
|
|
||||||
CREATE USER MAPPING FOR public SERVER fdtest
|
|
||||||
OPTIONS (server 'localhost'); -- fail, can't specify server here
|
|
||||||
ERROR: invalid option "server"
|
|
||||||
-HINT: Valid options in this context are: user, password
|
|
||||||
+HINT: Valid options in this context are: user, password, sslpassword
|
|
||||||
CREATE USER MAPPING FOR public SERVER fdtest OPTIONS (user :'USER');
|
|
||||||
GRANT USAGE ON FOREIGN SERVER fdtest TO regress_dblink_user;
|
|
||||||
GRANT EXECUTE ON FUNCTION dblink_connect_u(text, text) TO regress_dblink_user;
|
|
@ -1,249 +0,0 @@
|
|||||||
From 681d9e4621aac0a9c71364b6f54f00f6d8c4337f Mon Sep 17 00:00:00 2001
|
|
||||||
From 8d525d7b9545884a3e0d79adcd61543f9ae2ae28 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Noah Misch <noah@leadboat.com>
|
|
||||||
Date: Mon, 8 May 2023 06:14:07 -0700
|
|
||||||
Subject: Replace last PushOverrideSearchPath() call with
|
|
||||||
set_config_option().
|
|
||||||
|
|
||||||
The two methods don't cooperate, so set_config_option("search_path",
|
|
||||||
...) has been ineffective under non-empty overrideStack. This defect
|
|
||||||
enabled an attacker having database-level CREATE privilege to execute
|
|
||||||
arbitrary code as the bootstrap superuser. While that particular attack
|
|
||||||
requires v13+ for the trusted extension attribute, other attacks are
|
|
||||||
feasible in all supported versions.
|
|
||||||
|
|
||||||
Standardize on the combination of NewGUCNestLevel() and
|
|
||||||
set_config_option("search_path", ...). It is newer than
|
|
||||||
PushOverrideSearchPath(), more-prevalent, and has no known
|
|
||||||
disadvantages. The "override" mechanism remains for now, for
|
|
||||||
compatibility with out-of-tree code. Users should update such code,
|
|
||||||
which likely suffers from the same sort of vulnerability closed here.
|
|
||||||
Back-patch to v11 (all supported versions).
|
|
||||||
|
|
||||||
Alexander Lakhin. Reported by Alexander Lakhin.
|
|
||||||
|
|
||||||
Security: CVE-2023-2454
|
|
||||||
---
|
|
||||||
contrib/seg/Makefile | 2 +-
|
|
||||||
contrib/seg/expected/security.out | 32 ++++++++++++++++++
|
|
||||||
contrib/seg/sql/security.sql | 32 ++++++++++++++++++
|
|
||||||
src/backend/catalog/namespace.c | 4 +++
|
|
||||||
src/backend/commands/schemacmds.c | 37 ++++++++++++++------
|
|
||||||
src/test/regress/expected/namespace.out | 45 +++++++++++++++++++++++++
|
|
||||||
src/test/regress/sql/namespace.sql | 24 +++++++++++++
|
|
||||||
7 files changed, 165 insertions(+), 11 deletions(-)
|
|
||||||
create mode 100644 contrib/seg/expected/security.out
|
|
||||||
create mode 100644 contrib/seg/sql/security.sql
|
|
||||||
|
|
||||||
diff --git a/src/backend/catalog/namespace.c b/src/backend/catalog/namespace.c
|
|
||||||
index 14e57adee2..73ddb67882 100644
|
|
||||||
--- a/src/backend/catalog/namespace.c
|
|
||||||
+++ b/src/backend/catalog/namespace.c
|
|
||||||
@@ -3515,6 +3515,10 @@ OverrideSearchPathMatchesCurrent(OverrideSearchPath *path)
|
|
||||||
/*
|
|
||||||
* PushOverrideSearchPath - temporarily override the search path
|
|
||||||
*
|
|
||||||
+ * Do not use this function; almost any usage introduces a security
|
|
||||||
+ * vulnerability. It exists for the benefit of legacy code running in
|
|
||||||
+ * non-security-sensitive environments.
|
|
||||||
+ *
|
|
||||||
* We allow nested overrides, hence the push/pop terminology. The GUC
|
|
||||||
* search_path variable is ignored while an override is active.
|
|
||||||
*
|
|
||||||
diff --git a/src/backend/commands/schemacmds.c b/src/backend/commands/schemacmds.c
|
|
||||||
index 48590247f8..b6a71154a8 100644
|
|
||||||
--- a/src/backend/commands/schemacmds.c
|
|
||||||
+++ b/src/backend/commands/schemacmds.c
|
|
||||||
@@ -30,6 +30,7 @@
|
|
||||||
#include "commands/schemacmds.h"
|
|
||||||
#include "miscadmin.h"
|
|
||||||
#include "parser/parse_utilcmd.h"
|
|
||||||
+#include "parser/scansup.h"
|
|
||||||
#include "tcop/utility.h"
|
|
||||||
#include "utils/acl.h"
|
|
||||||
#include "utils/builtins.h"
|
|
||||||
@@ -53,14 +54,16 @@ CreateSchemaCommand(CreateSchemaStmt *stmt, const char *queryString,
|
|
||||||
{
|
|
||||||
const char *schemaName = stmt->schemaname;
|
|
||||||
Oid namespaceId;
|
|
||||||
- OverrideSearchPath *overridePath;
|
|
||||||
List *parsetree_list;
|
|
||||||
ListCell *parsetree_item;
|
|
||||||
Oid owner_uid;
|
|
||||||
Oid saved_uid;
|
|
||||||
int save_sec_context;
|
|
||||||
+ int save_nestlevel;
|
|
||||||
+ char *nsp = namespace_search_path;
|
|
||||||
AclResult aclresult;
|
|
||||||
ObjectAddress address;
|
|
||||||
+ StringInfoData pathbuf;
|
|
||||||
|
|
||||||
GetUserIdAndSecContext(&saved_uid, &save_sec_context);
|
|
||||||
|
|
||||||
@@ -153,14 +156,26 @@ CreateSchemaCommand(CreateSchemaStmt *stmt, const char *queryString,
|
|
||||||
CommandCounterIncrement();
|
|
||||||
|
|
||||||
/*
|
|
||||||
- * Temporarily make the new namespace be the front of the search path, as
|
|
||||||
- * well as the default creation target namespace. This will be undone at
|
|
||||||
- * the end of this routine, or upon error.
|
|
||||||
+ * Prepend the new schema to the current search path.
|
|
||||||
+ *
|
|
||||||
+ * We use the equivalent of a function SET option to allow the setting to
|
|
||||||
+ * persist for exactly the duration of the schema creation. guc.c also
|
|
||||||
+ * takes care of undoing the setting on error.
|
|
||||||
*/
|
|
||||||
- overridePath = GetOverrideSearchPath(CurrentMemoryContext);
|
|
||||||
- overridePath->schemas = lcons_oid(namespaceId, overridePath->schemas);
|
|
||||||
- /* XXX should we clear overridePath->useTemp? */
|
|
||||||
- PushOverrideSearchPath(overridePath);
|
|
||||||
+ save_nestlevel = NewGUCNestLevel();
|
|
||||||
+
|
|
||||||
+ initStringInfo(&pathbuf);
|
|
||||||
+ appendStringInfoString(&pathbuf, quote_identifier(schemaName));
|
|
||||||
+
|
|
||||||
+ while (scanner_isspace(*nsp))
|
|
||||||
+ nsp++;
|
|
||||||
+
|
|
||||||
+ if (*nsp != '\0')
|
|
||||||
+ appendStringInfo(&pathbuf, ", %s", nsp);
|
|
||||||
+
|
|
||||||
+ (void) set_config_option("search_path", pathbuf.data,
|
|
||||||
+ PGC_USERSET, PGC_S_SESSION,
|
|
||||||
+ GUC_ACTION_SAVE, true, 0, false);
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Report the new schema to possibly interested event triggers. Note we
|
|
||||||
@@ -215,8 +230,10 @@ CreateSchemaCommand(CreateSchemaStmt *stmt, const char *queryString,
|
|
||||||
CommandCounterIncrement();
|
|
||||||
}
|
|
||||||
|
|
||||||
- /* Reset search path to normal state */
|
|
||||||
- PopOverrideSearchPath();
|
|
||||||
+ /*
|
|
||||||
+ * Restore the GUC variable search_path we set above.
|
|
||||||
+ */
|
|
||||||
+ AtEOXact_GUC(true, save_nestlevel);
|
|
||||||
|
|
||||||
/* Reset current user and security context */
|
|
||||||
SetUserIdAndSecContext(saved_uid, save_sec_context);
|
|
||||||
diff --git a/src/test/regress/expected/namespace.out b/src/test/regress/expected/namespace.out
|
|
||||||
index 2564d1b080..a62fd8ded0 100644
|
|
||||||
--- a/src/test/regress/expected/namespace.out
|
|
||||||
+++ b/src/test/regress/expected/namespace.out
|
|
||||||
@@ -1,6 +1,14 @@
|
|
||||||
--
|
|
||||||
-- Regression tests for schemas (namespaces)
|
|
||||||
--
|
|
||||||
+-- set the whitespace-only search_path to test that the
|
|
||||||
+-- GUC list syntax is preserved during a schema creation
|
|
||||||
+SELECT pg_catalog.set_config('search_path', ' ', false);
|
|
||||||
+ set_config
|
|
||||||
+------------
|
|
||||||
+
|
|
||||||
+(1 row)
|
|
||||||
+
|
|
||||||
CREATE SCHEMA test_schema_1
|
|
||||||
CREATE UNIQUE INDEX abc_a_idx ON abc (a)
|
|
||||||
CREATE VIEW abc_view AS
|
|
||||||
@@ -9,6 +17,43 @@ CREATE SCHEMA test_schema_1
|
|
||||||
a serial,
|
|
||||||
b int UNIQUE
|
|
||||||
);
|
|
||||||
+-- verify that the correct search_path restored on abort
|
|
||||||
+SET search_path to public;
|
|
||||||
+BEGIN;
|
|
||||||
+SET search_path to public, test_schema_1;
|
|
||||||
+CREATE SCHEMA test_schema_2
|
|
||||||
+ CREATE VIEW abc_view AS SELECT c FROM abc;
|
|
||||||
+ERROR: column "c" does not exist
|
|
||||||
+LINE 2: CREATE VIEW abc_view AS SELECT c FROM abc;
|
|
||||||
+ ^
|
|
||||||
+COMMIT;
|
|
||||||
+SHOW search_path;
|
|
||||||
+ search_path
|
|
||||||
+-------------
|
|
||||||
+ public
|
|
||||||
+(1 row)
|
|
||||||
+
|
|
||||||
+-- verify that the correct search_path preserved
|
|
||||||
+-- after creating the schema and on commit
|
|
||||||
+BEGIN;
|
|
||||||
+SET search_path to public, test_schema_1;
|
|
||||||
+CREATE SCHEMA test_schema_2
|
|
||||||
+ CREATE VIEW abc_view AS SELECT a FROM abc;
|
|
||||||
+SHOW search_path;
|
|
||||||
+ search_path
|
|
||||||
+-----------------------
|
|
||||||
+ public, test_schema_1
|
|
||||||
+(1 row)
|
|
||||||
+
|
|
||||||
+COMMIT;
|
|
||||||
+SHOW search_path;
|
|
||||||
+ search_path
|
|
||||||
+-----------------------
|
|
||||||
+ public, test_schema_1
|
|
||||||
+(1 row)
|
|
||||||
+
|
|
||||||
+DROP SCHEMA test_schema_2 CASCADE;
|
|
||||||
+NOTICE: drop cascades to view test_schema_2.abc_view
|
|
||||||
-- verify that the objects were created
|
|
||||||
SELECT COUNT(*) FROM pg_class WHERE relnamespace =
|
|
||||||
(SELECT oid FROM pg_namespace WHERE nspname = 'test_schema_1');
|
|
||||||
diff --git a/src/test/regress/sql/namespace.sql b/src/test/regress/sql/namespace.sql
|
|
||||||
index 6b12c96193..3474f5ecf4 100644
|
|
||||||
--- a/src/test/regress/sql/namespace.sql
|
|
||||||
+++ b/src/test/regress/sql/namespace.sql
|
|
||||||
@@ -2,6 +2,10 @@
|
|
||||||
-- Regression tests for schemas (namespaces)
|
|
||||||
--
|
|
||||||
|
|
||||||
+-- set the whitespace-only search_path to test that the
|
|
||||||
+-- GUC list syntax is preserved during a schema creation
|
|
||||||
+SELECT pg_catalog.set_config('search_path', ' ', false);
|
|
||||||
+
|
|
||||||
CREATE SCHEMA test_schema_1
|
|
||||||
CREATE UNIQUE INDEX abc_a_idx ON abc (a)
|
|
||||||
|
|
||||||
@@ -13,6 +17,26 @@ CREATE SCHEMA test_schema_1
|
|
||||||
b int UNIQUE
|
|
||||||
);
|
|
||||||
|
|
||||||
+-- verify that the correct search_path restored on abort
|
|
||||||
+SET search_path to public;
|
|
||||||
+BEGIN;
|
|
||||||
+SET search_path to public, test_schema_1;
|
|
||||||
+CREATE SCHEMA test_schema_2
|
|
||||||
+ CREATE VIEW abc_view AS SELECT c FROM abc;
|
|
||||||
+COMMIT;
|
|
||||||
+SHOW search_path;
|
|
||||||
+
|
|
||||||
+-- verify that the correct search_path preserved
|
|
||||||
+-- after creating the schema and on commit
|
|
||||||
+BEGIN;
|
|
||||||
+SET search_path to public, test_schema_1;
|
|
||||||
+CREATE SCHEMA test_schema_2
|
|
||||||
+ CREATE VIEW abc_view AS SELECT a FROM abc;
|
|
||||||
+SHOW search_path;
|
|
||||||
+COMMIT;
|
|
||||||
+SHOW search_path;
|
|
||||||
+DROP SCHEMA test_schema_2 CASCADE;
|
|
||||||
+
|
|
||||||
-- verify that the objects were created
|
|
||||||
SELECT COUNT(*) FROM pg_class WHERE relnamespace =
|
|
||||||
(SELECT oid FROM pg_namespace WHERE nspname = 'test_schema_1');
|
|
||||||
diff --git a/contrib/sepgsql/expected/ddl.out b/contrib/sepgsql/expected/ddl.out
|
|
||||||
index e8da587564..15d2b9c5e7 100644
|
|
||||||
--- a/contrib/sepgsql/expected/ddl.out
|
|
||||||
+++ b/contrib/sepgsql/expected/ddl.out
|
|
||||||
@@ -24,7 +24,6 @@ LOG: SELinux: allowed { create } scontext=unconfined_u:unconfined_r:sepgsql_reg
|
|
||||||
CREATE USER regress_sepgsql_test_user;
|
|
||||||
CREATE SCHEMA regtest_schema;
|
|
||||||
LOG: SELinux: allowed { create } scontext=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0 tcontext=unconfined_u:object_r:sepgsql_schema_t:s0 tclass=db_schema name="regtest_schema"
|
|
||||||
-LOG: SELinux: allowed { search } scontext=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0 tcontext=system_u:object_r:sepgsql_schema_t:s0 tclass=db_schema name="public"
|
|
||||||
GRANT ALL ON SCHEMA regtest_schema TO regress_sepgsql_test_user;
|
|
||||||
SET search_path = regtest_schema, public;
|
|
||||||
CREATE TABLE regtest_table (x serial primary key, y text);
|
|
||||||
--
|
|
||||||
2.41.0
|
|
||||||
|
|
@ -1,114 +0,0 @@
|
|||||||
From ca73753b090c33bc69ce299b4d7fff891a77b8ad Mon Sep 17 00:00:00 2001
|
|
||||||
From: Tom Lane <tgl@sss.pgh.pa.us>
|
|
||||||
Date: Mon, 8 May 2023 10:12:44 -0400
|
|
||||||
Subject: Handle RLS dependencies in inlined set-returning
|
|
||||||
functions properly.
|
|
||||||
|
|
||||||
If an SRF in the FROM clause references a table having row-level
|
|
||||||
security policies, and we inline that SRF into the calling query,
|
|
||||||
we neglected to mark the plan as potentially dependent on which
|
|
||||||
role is executing it. This could lead to later executions in the
|
|
||||||
same session returning or hiding rows that should have been hidden
|
|
||||||
or returned instead.
|
|
||||||
|
|
||||||
Our thanks to Wolfgang Walther for reporting this problem.
|
|
||||||
|
|
||||||
Stephen Frost and Tom Lane
|
|
||||||
|
|
||||||
Security: CVE-2023-2455
|
|
||||||
---
|
|
||||||
src/backend/optimizer/util/clauses.c | 7 ++++++
|
|
||||||
src/test/regress/expected/rowsecurity.out | 27 +++++++++++++++++++++++
|
|
||||||
src/test/regress/sql/rowsecurity.sql | 20 +++++++++++++++++
|
|
||||||
3 files changed, 54 insertions(+)
|
|
||||||
|
|
||||||
diff --git a/src/backend/optimizer/util/clauses.c b/src/backend/optimizer/util/clauses.c
|
|
||||||
index a9c7bc342e..11269fee3e 100644
|
|
||||||
--- a/src/backend/optimizer/util/clauses.c
|
|
||||||
+++ b/src/backend/optimizer/util/clauses.c
|
|
||||||
@@ -5205,6 +5205,13 @@ inline_set_returning_function(PlannerInfo *root, RangeTblEntry *rte)
|
|
||||||
*/
|
|
||||||
record_plan_function_dependency(root, func_oid);
|
|
||||||
|
|
||||||
+ /*
|
|
||||||
+ * We must also notice if the inserted query adds a dependency on the
|
|
||||||
+ * calling role due to RLS quals.
|
|
||||||
+ */
|
|
||||||
+ if (querytree->hasRowSecurity)
|
|
||||||
+ root->glob->dependsOnRole = true;
|
|
||||||
+
|
|
||||||
return querytree;
|
|
||||||
|
|
||||||
/* Here if func is not inlinable: release temp memory and return NULL */
|
|
||||||
diff --git a/src/test/regress/expected/rowsecurity.out b/src/test/regress/expected/rowsecurity.out
|
|
||||||
index 38f53ed486..e278346420 100644
|
|
||||||
--- a/src/test/regress/expected/rowsecurity.out
|
|
||||||
+++ b/src/test/regress/expected/rowsecurity.out
|
|
||||||
@@ -4427,6 +4427,33 @@ SELECT * FROM rls_tbl;
|
|
||||||
|
|
||||||
DROP TABLE rls_tbl;
|
|
||||||
RESET SESSION AUTHORIZATION;
|
|
||||||
+-- CVE-2023-2455: inlining an SRF may introduce an RLS dependency
|
|
||||||
+create table rls_t (c text);
|
|
||||||
+insert into rls_t values ('invisible to bob');
|
|
||||||
+alter table rls_t enable row level security;
|
|
||||||
+grant select on rls_t to regress_rls_alice, regress_rls_bob;
|
|
||||||
+create policy p1 on rls_t for select to regress_rls_alice using (true);
|
|
||||||
+create policy p2 on rls_t for select to regress_rls_bob using (false);
|
|
||||||
+create function rls_f () returns setof rls_t
|
|
||||||
+ stable language sql
|
|
||||||
+ as $$ select * from rls_t $$;
|
|
||||||
+prepare q as select current_user, * from rls_f();
|
|
||||||
+set role regress_rls_alice;
|
|
||||||
+execute q;
|
|
||||||
+ current_user | c
|
|
||||||
+-------------------+------------------
|
|
||||||
+ regress_rls_alice | invisible to bob
|
|
||||||
+(1 row)
|
|
||||||
+
|
|
||||||
+set role regress_rls_bob;
|
|
||||||
+execute q;
|
|
||||||
+ current_user | c
|
|
||||||
+--------------+---
|
|
||||||
+(0 rows)
|
|
||||||
+
|
|
||||||
+RESET ROLE;
|
|
||||||
+DROP FUNCTION rls_f();
|
|
||||||
+DROP TABLE rls_t;
|
|
||||||
--
|
|
||||||
-- Clean up objects
|
|
||||||
--
|
|
||||||
diff --git a/src/test/regress/sql/rowsecurity.sql b/src/test/regress/sql/rowsecurity.sql
|
|
||||||
index 0fd0cded7d..3d664538a6 100644
|
|
||||||
--- a/src/test/regress/sql/rowsecurity.sql
|
|
||||||
+++ b/src/test/regress/sql/rowsecurity.sql
|
|
||||||
@@ -2127,6 +2127,26 @@ SELECT * FROM rls_tbl;
|
|
||||||
DROP TABLE rls_tbl;
|
|
||||||
RESET SESSION AUTHORIZATION;
|
|
||||||
|
|
||||||
+-- CVE-2023-2455: inlining an SRF may introduce an RLS dependency
|
|
||||||
+create table rls_t (c text);
|
|
||||||
+insert into rls_t values ('invisible to bob');
|
|
||||||
+alter table rls_t enable row level security;
|
|
||||||
+grant select on rls_t to regress_rls_alice, regress_rls_bob;
|
|
||||||
+create policy p1 on rls_t for select to regress_rls_alice using (true);
|
|
||||||
+create policy p2 on rls_t for select to regress_rls_bob using (false);
|
|
||||||
+create function rls_f () returns setof rls_t
|
|
||||||
+ stable language sql
|
|
||||||
+ as $$ select * from rls_t $$;
|
|
||||||
+prepare q as select current_user, * from rls_f();
|
|
||||||
+set role regress_rls_alice;
|
|
||||||
+execute q;
|
|
||||||
+set role regress_rls_bob;
|
|
||||||
+execute q;
|
|
||||||
+
|
|
||||||
+RESET ROLE;
|
|
||||||
+DROP FUNCTION rls_f();
|
|
||||||
+DROP TABLE rls_t;
|
|
||||||
+
|
|
||||||
--
|
|
||||||
-- Clean up objects
|
|
||||||
--
|
|
||||||
--
|
|
||||||
2.41.0
|
|
||||||
|
|
@ -1 +0,0 @@
|
|||||||
94a4b2528372458e5662c18d406629266667c437198160a18cdfd2c4a4d6eee9 postgresql-10.23.tar.bz2
|
|
@ -0,0 +1 @@
|
|||||||
|
8df3c0474782589d3c6f374b5133b1bd14d168086edbc13c6e72e67dd4527a3b postgresql-12.22.tar.bz2
|
@ -0,0 +1 @@
|
|||||||
|
ceea92abee2a8c19408d278b68de6a78b6bd3dbb4fa2d653fa7ca745d666aab1 postgresql-13.18.tar.bz2
|
@ -1 +0,0 @@
|
|||||||
a754c02f7051c2f21e52f8669a421b50485afcde9a581674d6106326b189d126 postgresql-9.2.24.tar.bz2
|
|
@ -1,59 +0,0 @@
|
|||||||
Backport of the upstream commit:
|
|
||||||
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=2699fc035a75d0774c1f013e9320882287f78adb
|
|
||||||
|
|
||||||
Fix CVE-2023-5869
|
|
||||||
|
|
||||||
diff -ur postgresql-10.23/src/backend/commands/matview.c postgresql-10.23_patch/src/backend/commands/matview.c
|
|
||||||
--- postgresql-10.23/src/backend/commands/matview.c 2022-11-07 22:51:10.000000000 +0100
|
|
||||||
+++ postgresql-10.23_patch/src/backend/commands/matview.c 2024-02-12 21:22:57.000000000 +0100
|
|
||||||
@@ -646,14 +646,35 @@
|
|
||||||
errdetail("Row: %s",
|
|
||||||
SPI_getvalue(SPI_tuptable->vals[0], SPI_tuptable->tupdesc, 1))));
|
|
||||||
}
|
|
||||||
-
|
|
||||||
+ /*
|
|
||||||
+ * Create the temporary "diff" table.
|
|
||||||
+ *
|
|
||||||
+ * Temporarily switch out of the SECURITY_RESTRICTED_OPERATION context,
|
|
||||||
+ * because you cannot create temp tables in SRO context. For extra
|
|
||||||
+ * paranoia, add the composite type column only after switching back to
|
|
||||||
+ * SRO context.
|
|
||||||
+ */
|
|
||||||
SetUserIdAndSecContext(relowner,
|
|
||||||
save_sec_context | SECURITY_LOCAL_USERID_CHANGE);
|
|
||||||
+ resetStringInfo(&querybuf);
|
|
||||||
+ appendStringInfo(&querybuf,
|
|
||||||
+ "CREATE TEMP TABLE %s (tid pg_catalog.tid)",
|
|
||||||
+ diffname);
|
|
||||||
+ if (SPI_exec(querybuf.data, 0) != SPI_OK_UTILITY)
|
|
||||||
+ elog(ERROR, "SPI_exec failed: %s", querybuf.data);
|
|
||||||
+ SetUserIdAndSecContext(relowner,
|
|
||||||
+ save_sec_context | SECURITY_RESTRICTED_OPERATION);
|
|
||||||
+ resetStringInfo(&querybuf);
|
|
||||||
+ appendStringInfo(&querybuf,
|
|
||||||
+ "ALTER TABLE %s ADD COLUMN newdata %s",
|
|
||||||
+ diffname, tempname);
|
|
||||||
+ if (SPI_exec(querybuf.data, 0) != SPI_OK_UTILITY)
|
|
||||||
+ elog(ERROR, "SPI_exec failed: %s", querybuf.data);
|
|
||||||
|
|
||||||
/* Start building the query for creating the diff table. */
|
|
||||||
resetStringInfo(&querybuf);
|
|
||||||
appendStringInfo(&querybuf,
|
|
||||||
- "CREATE TEMP TABLE %s AS "
|
|
||||||
+ "INSERT INTO %s "
|
|
||||||
"SELECT mv.ctid AS tid, newdata.*::%s AS newdata "
|
|
||||||
"FROM %s mv FULL JOIN %s newdata ON (",
|
|
||||||
diffname, tempname, matviewname, tempname);
|
|
||||||
@@ -783,11 +804,9 @@
|
|
||||||
"ORDER BY tid");
|
|
||||||
|
|
||||||
/* Create the temporary "diff" table. */
|
|
||||||
- if (SPI_exec(querybuf.data, 0) != SPI_OK_UTILITY)
|
|
||||||
+ if (SPI_exec(querybuf.data, 0) != SPI_OK_INSERT)
|
|
||||||
elog(ERROR, "SPI_exec failed: %s", querybuf.data);
|
|
||||||
|
|
||||||
- SetUserIdAndSecContext(relowner,
|
|
||||||
- save_sec_context | SECURITY_RESTRICTED_OPERATION);
|
|
||||||
|
|
||||||
/*
|
|
||||||
* We have no further use for data from the "full-data" temp table, but we
|
|
@ -1,306 +0,0 @@
|
|||||||
From c48008f599fd0e3bca2923ff5b40b559ae1e4e2e Mon Sep 17 00:00:00 2001
|
|
||||||
From: Tom Lane <tgl@sss.pgh.pa.us>
|
|
||||||
Date: Mon, 6 Nov 2023 10:56:43 -0500
|
|
||||||
Subject: [PATCH] Detect integer overflow while computing new array dimensions.
|
|
||||||
|
|
||||||
array_set_element() and related functions allow an array to be
|
|
||||||
enlarged by assigning to subscripts outside the current array bounds.
|
|
||||||
While these places were careful to check that the new bounds are
|
|
||||||
allowable, they neglected to consider the risk of integer overflow
|
|
||||||
in computing the new bounds. In edge cases, we could compute new
|
|
||||||
bounds that are invalid but get past the subsequent checks,
|
|
||||||
allowing bad things to happen. Memory stomps that are potentially
|
|
||||||
exploitable for arbitrary code execution are possible, and so is
|
|
||||||
disclosure of server memory.
|
|
||||||
|
|
||||||
To fix, perform the hazardous computations using overflow-detecting
|
|
||||||
arithmetic routines, which fortunately exist in all still-supported
|
|
||||||
branches.
|
|
||||||
|
|
||||||
The test cases added for this generate (after patching) errors that
|
|
||||||
mention the value of MaxArraySize, which is platform-dependent.
|
|
||||||
Rather than introduce multiple expected-files, use psql's VERBOSITY
|
|
||||||
parameter to suppress the printing of the message text. v11 psql
|
|
||||||
lacks that parameter, so omit the tests in that branch.
|
|
||||||
|
|
||||||
Our thanks to Pedro Gallegos for reporting this problem.
|
|
||||||
|
|
||||||
Security: CVE-2023-5869
|
|
||||||
---
|
|
||||||
src/backend/utils/adt/arrayfuncs.c | 85 +++++++++++++++++++++++-------
|
|
||||||
src/backend/utils/adt/arrayutils.c | 6 ---
|
|
||||||
src/include/common/int.h | 69 ++++++++++++++++++++++++
|
|
||||||
src/include/utils/array.h | 6 +++
|
|
||||||
4 files changed, 142 insertions(+), 24 deletions(-)
|
|
||||||
create mode 100644 src/include/common/int.h
|
|
||||||
|
|
||||||
diff --git a/src/backend/utils/adt/arrayfuncs.c b/src/backend/utils/adt/arrayfuncs.c
|
|
||||||
index 553c517..7363893 100644
|
|
||||||
--- a/src/backend/utils/adt/arrayfuncs.c
|
|
||||||
+++ b/src/backend/utils/adt/arrayfuncs.c
|
|
||||||
@@ -22,6 +22,7 @@
|
|
||||||
|
|
||||||
#include "access/htup_details.h"
|
|
||||||
#include "catalog/pg_type.h"
|
|
||||||
+#include "common/int.h"
|
|
||||||
#include "funcapi.h"
|
|
||||||
#include "libpq/pqformat.h"
|
|
||||||
#include "utils/array.h"
|
|
||||||
@@ -2309,22 +2310,38 @@ array_set_element(Datum arraydatum,
|
|
||||||
addedbefore = addedafter = 0;
|
|
||||||
|
|
||||||
/*
|
|
||||||
- * Check subscripts
|
|
||||||
+ * Check subscripts. We assume the existing subscripts passed
|
|
||||||
+ * ArrayCheckBounds, so that dim[i] + lb[i] can be computed without
|
|
||||||
+ * overflow. But we must beware of other overflows in our calculations of
|
|
||||||
+ * new dim[] values.
|
|
||||||
*/
|
|
||||||
if (ndim == 1)
|
|
||||||
{
|
|
||||||
if (indx[0] < lb[0])
|
|
||||||
{
|
|
||||||
- addedbefore = lb[0] - indx[0];
|
|
||||||
- dim[0] += addedbefore;
|
|
||||||
+ /* addedbefore = lb[0] - indx[0]; */
|
|
||||||
+ /* dim[0] += addedbefore; */
|
|
||||||
+ if (pg_sub_s32_overflow(lb[0], indx[0], &addedbefore) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
lb[0] = indx[0];
|
|
||||||
if (addedbefore > 1)
|
|
||||||
newhasnulls = true; /* will insert nulls */
|
|
||||||
}
|
|
||||||
if (indx[0] >= (dim[0] + lb[0]))
|
|
||||||
{
|
|
||||||
- addedafter = indx[0] - (dim[0] + lb[0]) + 1;
|
|
||||||
- dim[0] += addedafter;
|
|
||||||
+ /* addedafter = indx[0] - (dim[0] + lb[0]) + 1; */
|
|
||||||
+ /* dim[0] += addedafter; */
|
|
||||||
+ if (pg_sub_s32_overflow(indx[0], dim[0] + lb[0], &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
if (addedafter > 1)
|
|
||||||
newhasnulls = true; /* will insert nulls */
|
|
||||||
}
|
|
||||||
@@ -2568,14 +2585,23 @@ array_set_element_expanded(Datum arraydatum,
|
|
||||||
addedbefore = addedafter = 0;
|
|
||||||
|
|
||||||
/*
|
|
||||||
- * Check subscripts (this logic matches original array_set_element)
|
|
||||||
+ * Check subscripts (this logic must match array_set_element). We assume
|
|
||||||
+ * the existing subscripts passed ArrayCheckBounds, so that dim[i] + lb[i]
|
|
||||||
+ * can be computed without overflow. But we must beware of other
|
|
||||||
+ * overflows in our calculations of new dim[] values.
|
|
||||||
*/
|
|
||||||
if (ndim == 1)
|
|
||||||
{
|
|
||||||
if (indx[0] < lb[0])
|
|
||||||
{
|
|
||||||
- addedbefore = lb[0] - indx[0];
|
|
||||||
- dim[0] += addedbefore;
|
|
||||||
+ /* addedbefore = lb[0] - indx[0]; */
|
|
||||||
+ /* dim[0] += addedbefore; */
|
|
||||||
+ if (pg_sub_s32_overflow(lb[0], indx[0], &addedbefore) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
lb[0] = indx[0];
|
|
||||||
dimschanged = true;
|
|
||||||
if (addedbefore > 1)
|
|
||||||
@@ -2583,8 +2609,15 @@ array_set_element_expanded(Datum arraydatum,
|
|
||||||
}
|
|
||||||
if (indx[0] >= (dim[0] + lb[0]))
|
|
||||||
{
|
|
||||||
- addedafter = indx[0] - (dim[0] + lb[0]) + 1;
|
|
||||||
- dim[0] += addedafter;
|
|
||||||
+ /* addedafter = indx[0] - (dim[0] + lb[0]) + 1; */
|
|
||||||
+ /* dim[0] += addedafter; */
|
|
||||||
+ if (pg_sub_s32_overflow(indx[0], dim[0] + lb[0], &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
dimschanged = true;
|
|
||||||
if (addedafter > 1)
|
|
||||||
newhasnulls = true; /* will insert nulls */
|
|
||||||
@@ -2866,7 +2899,10 @@ array_set_slice(Datum arraydatum,
|
|
||||||
addedbefore = addedafter = 0;
|
|
||||||
|
|
||||||
/*
|
|
||||||
- * Check subscripts
|
|
||||||
+ * Check subscripts. We assume the existing subscripts passed
|
|
||||||
+ * ArrayCheckBounds, so that dim[i] + lb[i] can be computed without
|
|
||||||
+ * overflow. But we must beware of other overflows in our calculations of
|
|
||||||
+ * new dim[] values.
|
|
||||||
*/
|
|
||||||
if (ndim == 1)
|
|
||||||
{
|
|
||||||
@@ -2881,18 +2917,31 @@ array_set_slice(Datum arraydatum,
|
|
||||||
errmsg("upper bound cannot be less than lower bound")));
|
|
||||||
if (lowerIndx[0] < lb[0])
|
|
||||||
{
|
|
||||||
- if (upperIndx[0] < lb[0] - 1)
|
|
||||||
- newhasnulls = true; /* will insert nulls */
|
|
||||||
- addedbefore = lb[0] - lowerIndx[0];
|
|
||||||
- dim[0] += addedbefore;
|
|
||||||
+ /* addedbefore = lb[0] - lowerIndx[0]; */
|
|
||||||
+ /* dim[0] += addedbefore; */
|
|
||||||
+ if (pg_sub_s32_overflow(lb[0], lowerIndx[0], &addedbefore) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
lb[0] = lowerIndx[0];
|
|
||||||
+ if (addedbefore > 1)
|
|
||||||
+ newhasnulls = true; /* will insert nulls */
|
|
||||||
}
|
|
||||||
if (upperIndx[0] >= (dim[0] + lb[0]))
|
|
||||||
{
|
|
||||||
- if (lowerIndx[0] > (dim[0] + lb[0]))
|
|
||||||
+ /* addedafter = upperIndx[0] - (dim[0] + lb[0]) + 1; */
|
|
||||||
+ /* dim[0] += addedafter; */
|
|
||||||
+ if (pg_sub_s32_overflow(upperIndx[0], dim[0] + lb[0], &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
|
||||||
+ pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
|
||||||
+ ereport(ERROR,
|
|
||||||
+ (errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
|
||||||
+ errmsg("array size exceeds the maximum allowed (%d)",
|
|
||||||
+ (int) MaxArraySize)));
|
|
||||||
+ if (addedafter > 1)
|
|
||||||
newhasnulls = true; /* will insert nulls */
|
|
||||||
- addedafter = upperIndx[0] - (dim[0] + lb[0]) + 1;
|
|
||||||
- dim[0] += addedafter;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
diff --git a/src/backend/utils/adt/arrayutils.c b/src/backend/utils/adt/arrayutils.c
|
|
||||||
index f7c6a51..eb5f2a0 100644
|
|
||||||
--- a/src/backend/utils/adt/arrayutils.c
|
|
||||||
+++ b/src/backend/utils/adt/arrayutils.c
|
|
||||||
@@ -63,10 +63,6 @@ ArrayGetOffset0(int n, const int *tup, const int *scale)
|
|
||||||
* This must do overflow checking, since it is used to validate that a user
|
|
||||||
* dimensionality request doesn't overflow what we can handle.
|
|
||||||
*
|
|
||||||
- * We limit array sizes to at most about a quarter billion elements,
|
|
||||||
- * so that it's not necessary to check for overflow in quite so many
|
|
||||||
- * places --- for instance when palloc'ing Datum arrays.
|
|
||||||
- *
|
|
||||||
* The multiplication overflow check only works on machines that have int64
|
|
||||||
* arithmetic, but that is nearly all platforms these days, and doing check
|
|
||||||
* divides for those that don't seems way too expensive.
|
|
||||||
@@ -77,8 +73,6 @@ ArrayGetNItems(int ndim, const int *dims)
|
|
||||||
int32 ret;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
-#define MaxArraySize ((Size) (MaxAllocSize / sizeof(Datum)))
|
|
||||||
-
|
|
||||||
if (ndim <= 0)
|
|
||||||
return 0;
|
|
||||||
ret = 1;
|
|
||||||
diff --git a/src/include/common/int.h b/src/include/common/int.h
|
|
||||||
new file mode 100644
|
|
||||||
index 0000000..4235586
|
|
||||||
--- /dev/null
|
|
||||||
+++ b/src/include/common/int.h
|
|
||||||
@@ -0,0 +1,69 @@
|
|
||||||
+/*-------------------------------------------------------------------------
|
|
||||||
+ *
|
|
||||||
+ * int.h
|
|
||||||
+ * Routines to perform integer math, while checking for overflows.
|
|
||||||
+ *
|
|
||||||
+ * The routines in this file are intended to be well defined C, without
|
|
||||||
+ * relying on compiler flags like -fwrapv.
|
|
||||||
+ *
|
|
||||||
+ * To reduce the overhead of these routines try to use compiler intrinsics
|
|
||||||
+ * where available. That's not that important for the 16, 32 bit cases, but
|
|
||||||
+ * the 64 bit cases can be considerably faster with intrinsics. In case no
|
|
||||||
+ * intrinsics are available 128 bit math is used where available.
|
|
||||||
+ *
|
|
||||||
+ * Copyright (c) 2017-2018, PostgreSQL Global Development Group
|
|
||||||
+ *
|
|
||||||
+ * src/include/common/int.h
|
|
||||||
+ *
|
|
||||||
+ *-------------------------------------------------------------------------
|
|
||||||
+ */
|
|
||||||
+#ifndef COMMON_INT_H
|
|
||||||
+#define COMMON_INT_H
|
|
||||||
+
|
|
||||||
+/*
|
|
||||||
+ * If a + b overflows, return true, otherwise store the result of a + b into
|
|
||||||
+ * *result. The content of *result is implementation defined in case of
|
|
||||||
+ * overflow.
|
|
||||||
+ */
|
|
||||||
+static inline bool
|
|
||||||
+pg_add_s32_overflow(int32 a, int32 b, int32 *result)
|
|
||||||
+{
|
|
||||||
+#if defined(HAVE__BUILTIN_OP_OVERFLOW)
|
|
||||||
+ return __builtin_add_overflow(a, b, result);
|
|
||||||
+#else
|
|
||||||
+ int64 res = (int64) a + (int64) b;
|
|
||||||
+
|
|
||||||
+ if (res > PG_INT32_MAX || res < PG_INT32_MIN)
|
|
||||||
+ {
|
|
||||||
+ *result = 0x5EED; /* to avoid spurious warnings */
|
|
||||||
+ return true;
|
|
||||||
+ }
|
|
||||||
+ *result = (int32) res;
|
|
||||||
+ return false;
|
|
||||||
+#endif
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/*
|
|
||||||
+ * If a - b overflows, return true, otherwise store the result of a - b into
|
|
||||||
+ * *result. The content of *result is implementation defined in case of
|
|
||||||
+ * overflow.
|
|
||||||
+ */
|
|
||||||
+static inline bool
|
|
||||||
+pg_sub_s32_overflow(int32 a, int32 b, int32 *result)
|
|
||||||
+{
|
|
||||||
+#if defined(HAVE__BUILTIN_OP_OVERFLOW)
|
|
||||||
+ return __builtin_sub_overflow(a, b, result);
|
|
||||||
+#else
|
|
||||||
+ int64 res = (int64) a - (int64) b;
|
|
||||||
+
|
|
||||||
+ if (res > PG_INT32_MAX || res < PG_INT32_MIN)
|
|
||||||
+ {
|
|
||||||
+ *result = 0x5EED; /* to avoid spurious warnings */
|
|
||||||
+ return true;
|
|
||||||
+ }
|
|
||||||
+ *result = (int32) res;
|
|
||||||
+ return false;
|
|
||||||
+#endif
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+#endif /* COMMON_INT_H */
|
|
||||||
diff --git a/src/include/utils/array.h b/src/include/utils/array.h
|
|
||||||
index 905f6b0..2d96834 100644
|
|
||||||
--- a/src/include/utils/array.h
|
|
||||||
+++ b/src/include/utils/array.h
|
|
||||||
@@ -64,6 +64,12 @@
|
|
||||||
#include "fmgr.h"
|
|
||||||
#include "utils/expandeddatum.h"
|
|
||||||
|
|
||||||
+/*
|
|
||||||
+ * Maximum number of elements in an array. We limit this to at most about a
|
|
||||||
+ * quarter billion elements, so that it's not necessary to check for overflow
|
|
||||||
+ * in quite so many places --- for instance when palloc'ing Datum arrays.
|
|
||||||
+ */
|
|
||||||
+#define MaxArraySize ((Size) (MaxAllocSize / sizeof(Datum)))
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Arrays are varlena objects, so must meet the varlena convention that
|
|
||||||
--
|
|
||||||
2.43.0
|
|
@ -0,0 +1,43 @@
|
|||||||
|
We don't build/install interfaces by upstream's implicit rules.
|
||||||
|
|
||||||
|
This patch is used on two places; postgresql.spec and libecpg.spec -- keep those
|
||||||
|
in sync!
|
||||||
|
|
||||||
|
Related: rhbz#1618698
|
||||||
|
|
||||||
|
diff --git a/src/Makefile b/src/Makefile
|
||||||
|
index bcdbd95..4bea236 100644
|
||||||
|
--- a/src/Makefile
|
||||||
|
+++ b/src/Makefile
|
||||||
|
@@ -20,7 +20,6 @@ SUBDIRS = \
|
||||||
|
backend/utils/mb/conversion_procs \
|
||||||
|
backend/snowball \
|
||||||
|
include \
|
||||||
|
- interfaces \
|
||||||
|
backend/replication/libpqwalreceiver \
|
||||||
|
backend/replication/pgoutput \
|
||||||
|
fe_utils \
|
||||||
|
diff --git a/src/Makefile.global.in b/src/Makefile.global.in
|
||||||
|
index b9d86ac..29df69f 100644
|
||||||
|
--- a/src/Makefile.global.in
|
||||||
|
+++ b/src/Makefile.global.in
|
||||||
|
@@ -549,7 +549,7 @@ endif
|
||||||
|
# How to link to libpq. (This macro may be used as-is by backend extensions.
|
||||||
|
# Client-side code should go through libpq_pgport or libpq_pgport_shlib,
|
||||||
|
# instead.)
|
||||||
|
-libpq = -L$(libpq_builddir) -lpq
|
||||||
|
+libpq = -lpq
|
||||||
|
|
||||||
|
# libpq_pgport is for use by client executables (not libraries) that use libpq.
|
||||||
|
# We force clients to pull symbols from the non-shared libraries libpgport
|
||||||
|
@@ -579,7 +579,6 @@ endif
|
||||||
|
# Commonly used submake targets
|
||||||
|
|
||||||
|
submake-libpq: | submake-generated-headers
|
||||||
|
- $(MAKE) -C $(libpq_builddir) all
|
||||||
|
|
||||||
|
submake-libpgport: | submake-generated-headers
|
||||||
|
$(MAKE) -C $(top_builddir)/src/port all
|
||||||
|
--
|
||||||
|
2.21.0
|
||||||
|
|
@ -1,37 +0,0 @@
|
|||||||
PostgreSQL ecpg/initdb manual page fixes
|
|
||||||
|
|
||||||
This was generated based on automatic Red Hat manual page scan (private
|
|
||||||
RHBZ#948933).
|
|
||||||
|
|
||||||
diff -up ./doc/src/sgml/man1/ecpg.1.man948933 ./doc/src/sgml/man1/ecpg.1
|
|
||||||
--- ./doc/src/sgml/man1/ecpg.1.man948933 2014-12-16 02:13:15.000000000 +0100
|
|
||||||
+++ ./doc/src/sgml/man1/ecpg.1 2014-12-23 11:26:37.883644047 +0100
|
|
||||||
@@ -128,6 +133,11 @@ Allow question mark as placeholder for c
|
|
||||||
.RE
|
|
||||||
.RE
|
|
||||||
.PP
|
|
||||||
+\fB\-\-regression\fR
|
|
||||||
+.RS 4
|
|
||||||
+Run in regression testing mode\&.
|
|
||||||
+.RE
|
|
||||||
+.PP
|
|
||||||
\fB\-t\fR
|
|
||||||
.RS 4
|
|
||||||
Turn on autocommit of transactions\&. In this mode, each SQL command is automatically committed unless it is inside an explicit transaction block\&. In the default mode, commands are committed only when
|
|
||||||
diff -up ./doc/src/sgml/man1/initdb.1.man948933 ./doc/src/sgml/man1/initdb.1
|
|
||||||
--- ./doc/src/sgml/man1/initdb.1.man948933 2014-12-16 02:13:21.000000000 +0100
|
|
||||||
+++ ./doc/src/sgml/man1/initdb.1 2014-12-23 11:26:37.883644047 +0100
|
|
||||||
@@ -281,6 +281,13 @@ determines that an error prevented it fr
|
|
||||||
.PP
|
|
||||||
Other options:
|
|
||||||
.PP
|
|
||||||
+\fB\-s\fR
|
|
||||||
+.br
|
|
||||||
+\fB\-\-show\fR
|
|
||||||
+.RS 4
|
|
||||||
+Print the internal settings, then exit\&.
|
|
||||||
+.RE
|
|
||||||
+.PP
|
|
||||||
\fB\-V\fR
|
|
||||||
.br
|
|
||||||
\fB\-\-version\fR
|
|
@ -0,0 +1,12 @@
|
|||||||
|
diff -up postgresql-13.1/src/interfaces/Makefile.patch10 postgresql-13.1/src/interfaces/Makefile
|
||||||
|
--- postgresql-13.1/src/interfaces/Makefile.patch10 2021-02-02 21:33:23.235292305 +0100
|
||||||
|
+++ postgresql-13.1/src/interfaces/Makefile 2021-02-02 21:33:30.281365440 +0100
|
||||||
|
@@ -12,7 +12,7 @@ subdir = src/interfaces
|
||||||
|
top_builddir = ../..
|
||||||
|
include $(top_builddir)/src/Makefile.global
|
||||||
|
|
||||||
|
-SUBDIRS = libpq ecpg
|
||||||
|
+SUBDIRS = libpq
|
||||||
|
|
||||||
|
$(recurse)
|
||||||
|
|
@ -1,33 +0,0 @@
|
|||||||
diff --git a/src/Makefile b/src/Makefile
|
|
||||||
index febbced..9737b55 100644
|
|
||||||
--- a/src/Makefile
|
|
||||||
+++ b/src/Makefile
|
|
||||||
@@ -20,7 +20,6 @@ SUBDIRS = \
|
|
||||||
backend/utils/mb/conversion_procs \
|
|
||||||
backend/snowball \
|
|
||||||
include \
|
|
||||||
- interfaces \
|
|
||||||
backend/replication/libpqwalreceiver \
|
|
||||||
backend/replication/pgoutput \
|
|
||||||
fe_utils \
|
|
||||||
diff --git a/src/Makefile.global.in b/src/Makefile.global.in
|
|
||||||
index 4ed5174..d0e0dae 100644
|
|
||||||
--- a/src/Makefile.global.in
|
|
||||||
+++ b/src/Makefile.global.in
|
|
||||||
@@ -457,7 +457,7 @@ endif
|
|
||||||
|
|
||||||
# This macro is for use by libraries linking to libpq. (Because libpgport
|
|
||||||
# isn't created with the same link flags as libpq, it can't be used.)
|
|
||||||
-libpq = -L$(libpq_builddir) -lpq
|
|
||||||
+libpq = -lpq
|
|
||||||
|
|
||||||
# This macro is for use by client executables (not libraries) that use libpq.
|
|
||||||
# We force clients to pull symbols from the non-shared libraries libpgport
|
|
||||||
@@ -483,7 +483,6 @@ endif
|
|
||||||
# Commonly used submake targets
|
|
||||||
|
|
||||||
submake-libpq:
|
|
||||||
- $(MAKE) -C $(libpq_builddir) all
|
|
||||||
|
|
||||||
submake-libpgport:
|
|
||||||
$(MAKE) -C $(top_builddir)/src/port all
|
|
@ -0,0 +1,102 @@
|
|||||||
|
diff -ur postgresql-13.4/contrib/pgcrypto/expected/pgp-decrypt.out postgresql-13.4.patched/contrib/pgcrypto/expected/pgp-decrypt.out
|
||||||
|
--- postgresql-13.4/contrib/pgcrypto/expected/pgp-decrypt.out 2021-08-09 16:49:05.000000000 -0400
|
||||||
|
+++ postgresql-13.4.patched/contrib/pgcrypto/expected/pgp-decrypt.out 2021-09-01 08:16:48.138600886 -0400
|
||||||
|
@@ -4,20 +4,6 @@
|
||||||
|
-- Checking ciphers
|
||||||
|
select pgp_sym_decrypt(dearmor('
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
-Comment: dat1.blowfish.sha1.mdc.s2k3.z0
|
||||||
|
-
|
||||||
|
-jA0EBAMCfFNwxnvodX9g0jwB4n4s26/g5VmKzVab1bX1SmwY7gvgvlWdF3jKisvS
|
||||||
|
-yA6Ce1QTMK3KdL2MPfamsTUSAML8huCJMwYQFfE=
|
||||||
|
-=JcP+
|
||||||
|
------END PGP MESSAGE-----
|
||||||
|
-'), 'foobar');
|
||||||
|
- pgp_sym_decrypt
|
||||||
|
------------------
|
||||||
|
- Secret message.
|
||||||
|
-(1 row)
|
||||||
|
-
|
||||||
|
-select pgp_sym_decrypt(dearmor('
|
||||||
|
------BEGIN PGP MESSAGE-----
|
||||||
|
Comment: dat1.aes.sha1.mdc.s2k3.z0
|
||||||
|
|
||||||
|
jA0EBwMCci97v0Q6Z0Zg0kQBsVf5Oe3iC+FBzUmuMV9KxmAyOMyjCc/5i8f1Eest
|
||||||
|
diff -ur postgresql-13.4/contrib/pgcrypto/expected/pgp-pubkey-decrypt.out postgresql-13.4.patched/contrib/pgcrypto/expected/pgp-pubkey-decrypt.out
|
||||||
|
--- postgresql-13.4/contrib/pgcrypto/expected/pgp-pubkey-decrypt.out 2021-08-09 16:49:05.000000000 -0400
|
||||||
|
+++ postgresql-13.4.patched/contrib/pgcrypto/expected/pgp-pubkey-decrypt.out 2021-09-01 08:05:27.750172653 -0400
|
||||||
|
@@ -594,13 +594,6 @@
|
||||||
|
(1 row)
|
||||||
|
|
||||||
|
select pgp_pub_decrypt(dearmor(data), dearmor(seckey))
|
||||||
|
-from keytbl, encdata where keytbl.id=2 and encdata.id=2;
|
||||||
|
- pgp_pub_decrypt
|
||||||
|
------------------
|
||||||
|
- Secret msg
|
||||||
|
-(1 row)
|
||||||
|
-
|
||||||
|
-select pgp_pub_decrypt(dearmor(data), dearmor(seckey))
|
||||||
|
from keytbl, encdata where keytbl.id=3 and encdata.id=3;
|
||||||
|
pgp_pub_decrypt
|
||||||
|
-----------------
|
||||||
|
diff -ur postgresql-13.4/contrib/pgcrypto/Makefile postgresql-13.4.patched/contrib/pgcrypto/Makefile
|
||||||
|
--- postgresql-13.4/contrib/pgcrypto/Makefile 2021-08-09 16:49:05.000000000 -0400
|
||||||
|
+++ postgresql-13.4.patched/contrib/pgcrypto/Makefile 2021-09-01 08:26:47.207164873 -0400
|
||||||
|
@@ -5,7 +5,7 @@
|
||||||
|
INT_TESTS = sha2
|
||||||
|
|
||||||
|
OSSL_SRCS = openssl.c pgp-mpi-openssl.c
|
||||||
|
-OSSL_TESTS = sha2 des 3des cast5
|
||||||
|
+OSSL_TESTS = sha2
|
||||||
|
|
||||||
|
ZLIB_TST = pgp-compression
|
||||||
|
ZLIB_OFF_TST = pgp-zlib-DISABLED
|
||||||
|
@@ -49,12 +49,13 @@
|
||||||
|
pgcrypto--1.0--1.1.sql
|
||||||
|
PGFILEDESC = "pgcrypto - cryptographic functions"
|
||||||
|
|
||||||
|
-REGRESS = init md5 sha1 hmac-md5 hmac-sha1 blowfish rijndael \
|
||||||
|
+REGRESS = init md5 sha1 hmac-md5 hmac-sha1 rijndael \
|
||||||
|
$(CF_TESTS) \
|
||||||
|
- crypt-des crypt-md5 crypt-blowfish crypt-xdes \
|
||||||
|
+ crypt-md5 \
|
||||||
|
pgp-armor pgp-decrypt pgp-encrypt $(CF_PGP_TESTS) \
|
||||||
|
pgp-pubkey-decrypt pgp-pubkey-encrypt pgp-info
|
||||||
|
|
||||||
|
+#REGRESS = init pgp-pubkey-decrypt pgp-decrypt \
|
||||||
|
EXTRA_CLEAN = gen-rtab
|
||||||
|
|
||||||
|
ifdef USE_PGXS
|
||||||
|
diff -ur postgresql-13.4/contrib/pgcrypto/sql/pgp-decrypt.sql postgresql-13.4.patched/contrib/pgcrypto/sql/pgp-decrypt.sql
|
||||||
|
--- postgresql-13.4/contrib/pgcrypto/sql/pgp-decrypt.sql 2021-08-09 16:49:05.000000000 -0400
|
||||||
|
+++ postgresql-13.4.patched/contrib/pgcrypto/sql/pgp-decrypt.sql 2021-09-01 08:16:12.525212175 -0400
|
||||||
|
@@ -5,16 +5,6 @@
|
||||||
|
-- Checking ciphers
|
||||||
|
select pgp_sym_decrypt(dearmor('
|
||||||
|
-----BEGIN PGP MESSAGE-----
|
||||||
|
-Comment: dat1.blowfish.sha1.mdc.s2k3.z0
|
||||||
|
-
|
||||||
|
-jA0EBAMCfFNwxnvodX9g0jwB4n4s26/g5VmKzVab1bX1SmwY7gvgvlWdF3jKisvS
|
||||||
|
-yA6Ce1QTMK3KdL2MPfamsTUSAML8huCJMwYQFfE=
|
||||||
|
-=JcP+
|
||||||
|
------END PGP MESSAGE-----
|
||||||
|
-'), 'foobar');
|
||||||
|
-
|
||||||
|
-select pgp_sym_decrypt(dearmor('
|
||||||
|
------BEGIN PGP MESSAGE-----
|
||||||
|
Comment: dat1.aes.sha1.mdc.s2k3.z0
|
||||||
|
|
||||||
|
jA0EBwMCci97v0Q6Z0Zg0kQBsVf5Oe3iC+FBzUmuMV9KxmAyOMyjCc/5i8f1Eest
|
||||||
|
diff -ur postgresql-13.4/contrib/pgcrypto/sql/pgp-pubkey-decrypt.sql postgresql-13.4.patched/contrib/pgcrypto/sql/pgp-pubkey-decrypt.sql
|
||||||
|
--- postgresql-13.4/contrib/pgcrypto/sql/pgp-pubkey-decrypt.sql 2021-08-09 16:49:05.000000000 -0400
|
||||||
|
+++ postgresql-13.4.patched/contrib/pgcrypto/sql/pgp-pubkey-decrypt.sql 2021-09-01 08:06:18.963732342 -0400
|
||||||
|
@@ -606,9 +606,6 @@
|
||||||
|
from keytbl, encdata where keytbl.id=1 and encdata.id=1;
|
||||||
|
|
||||||
|
select pgp_pub_decrypt(dearmor(data), dearmor(seckey))
|
||||||
|
-from keytbl, encdata where keytbl.id=2 and encdata.id=2;
|
||||||
|
-
|
||||||
|
-select pgp_pub_decrypt(dearmor(data), dearmor(seckey))
|
||||||
|
from keytbl, encdata where keytbl.id=3 and encdata.id=3;
|
||||||
|
|
||||||
|
select pgp_pub_decrypt(dearmor(data), dearmor(seckey))
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in new issue