Fixes the following security issue: CVE-2025-8713: PostgreSQL optimizer statistics can expose sampled data within a view, partition, or child table PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most- common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. CVE-2025-8714: PostgreSQL pg_dump lets superuser of origin server execute arbitrary code in psql client Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. CVE-2025-8715: PostgreSQL pg_dump newline in object name executes arbitrary code in psql client and in restore target server Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it. https://www.postgresql.org/about/news/postgresql-176-1610-1514-1419-1322-and-18-beta-3-released-3118/ Signed-off-by: Maxim Kochetkov <fido_max@inbox.ru> Signed-off-by: Julien Olivain <ju.o@free.fr>
161 lines
4.6 KiB
Makefile
161 lines
4.6 KiB
Makefile
################################################################################
|
|
#
|
|
# postgresql
|
|
#
|
|
################################################################################
|
|
|
|
POSTGRESQL_VERSION = 17.6
|
|
POSTGRESQL_SOURCE = postgresql-$(POSTGRESQL_VERSION).tar.bz2
|
|
POSTGRESQL_SITE = https://ftp.postgresql.org/pub/source/v$(POSTGRESQL_VERSION)
|
|
POSTGRESQL_LICENSE = PostgreSQL
|
|
POSTGRESQL_LICENSE_FILES = COPYRIGHT
|
|
POSTGRESQL_CPE_ID_VENDOR = postgresql
|
|
POSTGRESQL_SELINUX_MODULES = postgresql
|
|
POSTGRESQL_INSTALL_STAGING = YES
|
|
POSTGRESQL_CONFIG_SCRIPTS = pg_config
|
|
POSTGRESQL_LDFLAGS = $(TARGET_LDFLAGS) $(TARGET_NLS_LIBS)
|
|
# We have to force invalid paths for xmllint and xsltproc, otherwise
|
|
# if detected they get used, even with -Ddocs=disabled and
|
|
# -Ddocs_pdf=disabled, and it causes build failures
|
|
POSTGRESQL_CONF_OPTS = \
|
|
-Drpath=false \
|
|
-Ddocs=disabled \
|
|
-Ddocs_pdf=disabled \
|
|
-DXMLLINT=/nowhere \
|
|
-DXSLTPROC=/nowhere
|
|
POSTGRESQL_DEPENDENCIES = \
|
|
$(TARGET_NLS_DEPENDENCIES) \
|
|
host-bison \
|
|
host-flex
|
|
|
|
# CVE-2017-8806 is related to postgresql-common package
|
|
# It is false positive for postgresql
|
|
POSTGRESQL_IGNORE_CVES += CVE-2017-8806
|
|
|
|
ifeq ($(BR2_PACKAGE_POSTGRESQL_FULL),y)
|
|
POSTGRESQL_NINJA_OPTS += world
|
|
POSTGRESQL_INSTALL_TARGET_OPTS += DESTDIR=$(TARGET_DIR) install-world
|
|
POSTGRESQL_INSTALL_STAGING_OPTS += DESTDIR=$(STAGING_DIR) install-world
|
|
endif
|
|
|
|
ifeq ($(BR2_arcle)$(BR2_arceb)$(BR2_microblazeel)$(BR2_microblazebe)$(BR2_or1k)$(BR2_riscv)$(BR2_xtensa),y)
|
|
POSTGRESQL_CONF_OPTS += -Dspinlocks=false
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dspinlocks=true
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_READLINE),y)
|
|
POSTGRESQL_DEPENDENCIES += readline
|
|
POSTGRESQL_CONF_OPTS += -Dreadline=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dreadline=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_ZLIB),y)
|
|
POSTGRESQL_DEPENDENCIES += zlib
|
|
POSTGRESQL_CONF_OPTS += -Dzlib=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dzlib=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_TZDATA),y)
|
|
POSTGRESQL_DEPENDENCIES += tzdata
|
|
POSTGRESQL_CONF_OPTS += -Dsystem_tzdata=/usr/share/zoneinfo
|
|
else
|
|
POSTGRESQL_DEPENDENCIES += host-zic
|
|
POSTGRESQL_CONF_ENV += ZIC="$(ZIC)"
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_OPENSSL),y)
|
|
POSTGRESQL_DEPENDENCIES += openssl
|
|
POSTGRESQL_CONF_OPTS += -Dssl=openssl
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dssl=none
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_OPENLDAP),y)
|
|
POSTGRESQL_DEPENDENCIES += openldap
|
|
POSTGRESQL_CONF_OPTS += -Dldap=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dldap=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_ICU),y)
|
|
POSTGRESQL_DEPENDENCIES += icu
|
|
POSTGRESQL_CONF_OPTS += -Dicu=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dicu=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBXML2),y)
|
|
POSTGRESQL_DEPENDENCIES += libxml2
|
|
POSTGRESQL_CONF_OPTS += -Dlibxml=enabled
|
|
POSTGRESQL_CONF_ENV += XML2_CONFIG=$(STAGING_DIR)/usr/bin/xml2-config
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dlibxml=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_ZSTD),y)
|
|
POSTGRESQL_DEPENDENCIES += host-pkgconf zstd
|
|
POSTGRESQL_CONF_OPTS += -Dzstd=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dzstd=disabled
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_LZ4),y)
|
|
POSTGRESQL_DEPENDENCIES += host-pkgconf lz4
|
|
POSTGRESQL_CONF_OPTS += -Dlz4=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dlz4=disabled
|
|
endif
|
|
|
|
# required for postgresql.service Type=notify
|
|
ifeq ($(BR2_PACKAGE_SYSTEMD),y)
|
|
POSTGRESQL_DEPENDENCIES += systemd
|
|
POSTGRESQL_CONF_OPTS += -Dsystemd=enabled
|
|
else
|
|
POSTGRESQL_CONF_OPTS += -Dsystemd=disabled
|
|
endif
|
|
|
|
POSTGRESQL_CFLAGS = $(TARGET_CFLAGS)
|
|
|
|
ifneq ($(BR2_TOOLCHAIN_HAS_GCC_BUG_43744)$(BR2_TOOLCHAIN_HAS_GCC_BUG_85180),)
|
|
POSTGRESQL_CFLAGS += -O0
|
|
endif
|
|
|
|
POSTGRESQL_CONF_ENV += CFLAGS="$(POSTGRESQL_CFLAGS)"
|
|
|
|
define POSTGRESQL_USERS
|
|
postgres -1 postgres -1 * /var/lib/pgsql /bin/sh - PostgreSQL Server
|
|
endef
|
|
|
|
define POSTGRESQL_INSTALL_TARGET_FIXUP
|
|
$(INSTALL) -dm 0700 $(TARGET_DIR)/var/lib/pgsql
|
|
$(RM) -rf $(TARGET_DIR)/usr/lib/postgresql/pgxs
|
|
endef
|
|
|
|
POSTGRESQL_POST_INSTALL_TARGET_HOOKS += POSTGRESQL_INSTALL_TARGET_FIXUP
|
|
|
|
define POSTGRESQL_INSTALL_CUSTOM_PG_CONFIG
|
|
$(INSTALL) -m 0755 -D package/postgresql/pg_config \
|
|
$(STAGING_DIR)/usr/bin/pg_config
|
|
$(SED) "s|@POSTGRESQL_CONF_OPTIONS@|$(POSTGRESQL_CONF_OPTS)|g" $(STAGING_DIR)/usr/bin/pg_config
|
|
$(SED) "s|@POSTGRESQL_VERSION@|$(POSTGRESQL_VERSION)|g" $(STAGING_DIR)/usr/bin/pg_config
|
|
$(SED) "s|@TARGET_CFLAGS@|$(TARGET_CFLAGS)|g" $(STAGING_DIR)/usr/bin/pg_config
|
|
$(SED) "s|@TARGET_CC@|$(TARGET_CC)|g" $(STAGING_DIR)/usr/bin/pg_config
|
|
endef
|
|
|
|
POSTGRESQL_POST_INSTALL_STAGING_HOOKS += POSTGRESQL_INSTALL_CUSTOM_PG_CONFIG
|
|
|
|
define POSTGRESQL_INSTALL_INIT_SYSV
|
|
$(INSTALL) -m 0755 -D package/postgresql/S50postgresql \
|
|
$(TARGET_DIR)/etc/init.d/S50postgresql
|
|
endef
|
|
|
|
define POSTGRESQL_INSTALL_INIT_SYSTEMD
|
|
$(INSTALL) -D -m 644 package/postgresql/postgresql.service \
|
|
$(TARGET_DIR)/usr/lib/systemd/system/postgresql.service
|
|
endef
|
|
|
|
$(eval $(meson-package))
|