Fix CVE-2024-1597

(cherry picked from commit adec29e7542b857ac69f953797d0681bfd35f944)
This commit is contained in:
starlet-dx 2024-02-26 16:03:58 +08:00 committed by openeuler-sync-bot
parent ac0e4b3d34
commit 1933fb7ebc
3 changed files with 643 additions and 1 deletions

295
CVE-2024-1597-1.patch Normal file
View File

@ -0,0 +1,295 @@
From e479be16967ae20af1bd57187738d5243052bbee Mon Sep 17 00:00:00 2001
From: Dave Cramer <davecramer@gmail.com>
Date: Mon, 19 Feb 2024 08:20:59 -0500
Subject: [PATCH] Merge pull request from GHSA-24rp-q3w6-vc56
* SQL Injection via line comment generation for 42_4_x
* fix: Add parentheses around NULL parameter values in simple query mode
---------
Co-authored-by: Sehrope Sarkuni <sehrope@jackdb.com>
---
.../core/v3/SimpleParameterList.java | 112 +++++++++++-------
.../core/v3/V3ParameterListTests.java | 6 +-
.../jdbc/ParameterInjectionTest.java | 67 +++++++++++
3 files changed, 142 insertions(+), 43 deletions(-)
create mode 100644 src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
diff --git a/src/main/java/org/postgresql/core/v3/SimpleParameterList.java b/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
index 969880b..b996e0b 100644
--- a/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
+++ b/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
@@ -172,6 +172,58 @@ class SimpleParameterList implements V3ParameterList {
}
bind(index, NULL_OBJECT, oid, binaryTransfer);
}
+
+ /**
+ * <p>Escapes a given text value as a literal, wraps it in single quotes, casts it to the
+ * to the given data type, and finally wraps the whole thing in parentheses.</p>
+ *
+ * <p>For example, "123" and "int4" becomes "('123'::int)"</p>
+ *
+ * <p>The additional parentheses is added to ensure that the surrounding text of where the
+ * parameter value is entered does modify the interpretation of the value.</p>
+ *
+ * <p>For example if our input SQL is: <code>SELECT ?b</code></p>
+ *
+ * <p>Using a parameter value of '{}' and type of json we'd get:</p>
+ *
+ * <pre>
+ * test=# SELECT ('{}'::json)b;
+ * b
+ * ----
+ * {}
+ * </pre>
+ *
+ * <p>But without the parentheses the result changes:</p>
+ *
+ * <pre>
+ * test=# SELECT '{}'::jsonb;
+ * jsonb
+ * -------
+ * {}
+ * </pre>
+ **/
+ private static String quoteAndCast(String text, String type, boolean standardConformingStrings) {
+ StringBuilder sb = new StringBuilder((text.length() + 10) / 10 * 11); // Add 10% for escaping.
+ sb.append("('");
+ try {
+ Utils.escapeLiteral(sb, text, standardConformingStrings);
+ } catch (SQLException e) {
+ // This should only happen if we have an embedded null
+ // and there's not much we can do if we do hit one.
+ //
+ // To force a server side failure, we deliberately include
+ // a zero byte character in the literal to force the server
+ // to reject the command.
+ sb.append('\u0000');
+ }
+ sb.append("'");
+ if (type != null) {
+ sb.append("::");
+ sb.append(type);
+ }
+ sb.append(")");
+ return sb.toString();
+ }
@Override
public String toString(/* @Positive */ int index, boolean standardConformingStrings) {
@@ -180,100 +232,80 @@ class SimpleParameterList implements V3ParameterList {
if (paramValue == null) {
return "?";
} else if (paramValue == NULL_OBJECT) {
- return "NULL";
+ return "(NULL)";
} else if ((flags[index] & BINARY) == BINARY) {
// handle some of the numeric types
switch (paramTypes[index]) {
case Oid.INT2:
short s = ByteConverter.int2((byte[]) paramValue, 0);
- return Short.toString(s);
+ return quoteAndCast(Short.toString(s), "int2", standardConformingStrings);
case Oid.INT4:
int i = ByteConverter.int4((byte[]) paramValue, 0);
- return Integer.toString(i);
+ return quoteAndCast(Integer.toString(i), "int4", standardConformingStrings);
case Oid.INT8:
long l = ByteConverter.int8((byte[]) paramValue, 0);
- return Long.toString(l);
+ return quoteAndCast(Long.toString(l), "int8", standardConformingStrings);
case Oid.FLOAT4:
float f = ByteConverter.float4((byte[]) paramValue, 0);
if (Float.isNaN(f)) {
- return "'NaN'::real";
+ return "('NaN'::real)";
}
- return Float.toString(f);
+ return quoteAndCast(Float.toString(f), "float", standardConformingStrings);
case Oid.FLOAT8:
double d = ByteConverter.float8((byte[]) paramValue, 0);
if (Double.isNaN(d)) {
- return "'NaN'::double precision";
+ return "('NaN'::double precision)";
}
- return Double.toString(d);
+ return quoteAndCast(Double.toString(d), "double precision", standardConformingStrings);
case Oid.NUMERIC:
Number n = ByteConverter.numeric((byte[]) paramValue);
if (n instanceof Double) {
assert ((Double) n).isNaN();
- return "'NaN'::numeric";
+ return "('NaN'::numeric)";
}
return n.toString();
case Oid.UUID:
String uuid =
new UUIDArrayAssistant().buildElement((byte[]) paramValue, 0, 16).toString();
- return "'" + uuid + "'::uuid";
+ return quoteAndCast(uuid, "uuid", standardConformingStrings);
case Oid.POINT:
PGpoint pgPoint = new PGpoint();
pgPoint.setByteValue((byte[]) paramValue, 0);
- return "'" + pgPoint.toString() + "'::point";
+ return quoteAndCast(pgPoint.toString(), "point", standardConformingStrings);
case Oid.BOX:
PGbox pgBox = new PGbox();
pgBox.setByteValue((byte[]) paramValue, 0);
- return "'" + pgBox.toString() + "'::box";
+ return quoteAndCast(pgBox.toString(), "box", standardConformingStrings);
}
return "?";
} else {
String param = paramValue.toString();
-
- // add room for quotes + potential escaping.
- StringBuilder p = new StringBuilder(3 + (param.length() + 10) / 10 * 11);
-
- // No E'..' here since escapeLiteral escapes all things and it does not use \123 kind of
- // escape codes
- p.append('\'');
- try {
- p = Utils.escapeLiteral(p, param, standardConformingStrings);
- } catch (SQLException sqle) {
- // This should only happen if we have an embedded null
- // and there's not much we can do if we do hit one.
- //
- // The goal of toString isn't to be sent to the server,
- // so we aren't 100% accurate (see StreamWrapper), put
- // the unescaped version of the data.
- //
- p.append(param);
- }
- p.append('\'');
int paramType = paramTypes[index];
if (paramType == Oid.TIMESTAMP) {
- p.append("::timestamp");
+ return quoteAndCast(param, "timestamp", standardConformingStrings);
} else if (paramType == Oid.TIMESTAMPTZ) {
- p.append("::timestamp with time zone");
+ return quoteAndCast(param, "timestamp with time zone", standardConformingStrings);
} else if (paramType == Oid.TIME) {
- p.append("::time");
+ return quoteAndCast(param, "time", standardConformingStrings);
} else if (paramType == Oid.TIMETZ) {
- p.append("::time with time zone");
+ return quoteAndCast(param, "time with time zone", standardConformingStrings);
} else if (paramType == Oid.DATE) {
- p.append("::date");
+ return quoteAndCast(param, "date", standardConformingStrings);
} else if (paramType == Oid.INTERVAL) {
- p.append("::interval");
+ return quoteAndCast(param, "interval", standardConformingStrings);
} else if (paramType == Oid.NUMERIC) {
- p.append("::numeric");
+ return quoteAndCast(param, "numeric", standardConformingStrings);
}
- return p.toString();
+ return quoteAndCast(param, null, standardConformingStrings);
}
}
diff --git a/src/test/java/org/postgresql/core/v3/V3ParameterListTests.java b/src/test/java/org/postgresql/core/v3/V3ParameterListTests.java
index 200004f..19c51cb 100644
--- a/src/test/java/org/postgresql/core/v3/V3ParameterListTests.java
+++ b/src/test/java/org/postgresql/core/v3/V3ParameterListTests.java
@@ -58,8 +58,8 @@ public class V3ParameterListTests {
s2SPL.setIntParameter(4, 8);
s1SPL.appendAll(s2SPL);
- assertEquals(
- "Expected string representation of values does not match outcome.",
- "<[1 ,2 ,3 ,4 ,5 ,6 ,7 ,8]>", s1SPL.toString());
+ assertEquals("Expected string representation of values does not match outcome.",
+ "<[('1'::int4) ,('2'::int4) ,('3'::int4) ,('4'::int4) ,('5'::int4) ,('6'::int4) ,('7'::int4) ,('8'::int4)]>", s1SPL.toString());
+
}
}
diff --git a/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java b/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
new file mode 100644
index 0000000..2a33acd
--- /dev/null
+++ b/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
@@ -0,0 +1,67 @@
+/*
+ * Copyright (c) 2024, PostgreSQL Global Development Group
+ * See the LICENSE file in the project root for more information.
+ */
+
+package org.postgresql.jdbc;
+
+import static org.junit.jupiter.api.Assertions.assertEquals;
+import static org.junit.jupiter.api.Assertions.assertTrue;
+
+import org.postgresql.test.TestUtil;
+
+import org.junit.jupiter.api.Test;
+
+import java.sql.Connection;
+import java.sql.PreparedStatement;
+import java.sql.ResultSet;
+
+public class ParameterInjectionTest {
+ @Test
+ public void negateParameter() throws Exception {
+ try (Connection conn = TestUtil.openDB()) {
+ PreparedStatement stmt = conn.prepareStatement("SELECT -?");
+
+ stmt.setInt(1, 1);
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next());
+ assertEquals(1, rs.getMetaData().getColumnCount(), "number of result columns must match");
+ int value = rs.getInt(1);
+ assertEquals(-1, value, "Input value 1");
+ }
+
+ stmt.setInt(1, -1);
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next());
+ assertEquals(1, rs.getMetaData().getColumnCount(), "number of result columns must match");
+ int value = rs.getInt(1);
+ assertEquals(1, value, "Input value -1");
+ }
+ }
+ }
+
+ @Test
+ public void negateParameterWithContinuation() throws Exception {
+ try (Connection conn = TestUtil.openDB()) {
+ PreparedStatement stmt = conn.prepareStatement("SELECT -?, ?");
+
+ stmt.setInt(1, 1);
+ stmt.setString(2, "\nWHERE false --");
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next(), "ResultSet should contain a row");
+ assertEquals(2, rs.getMetaData().getColumnCount(), "rs.getMetaData().getColumnCount(");
+ int value = rs.getInt(1);
+ assertEquals(-1, value);
+ }
+
+ stmt.setInt(1, -1);
+ stmt.setString(2, "\nWHERE false --");
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next(), "ResultSet should contain a row");
+ assertEquals(2, rs.getMetaData().getColumnCount(), "rs.getMetaData().getColumnCount(");
+ int value = rs.getInt(1);
+ assertEquals(1, value);
+ }
+ }
+ }
+}
--
2.33.0

338
CVE-2024-1597-2.patch Normal file
View File

@ -0,0 +1,338 @@
From fe002b31f2c7dcf7e2fe75fe7fd18df4e4503abf Mon Sep 17 00:00:00 2001
From: Dave Cramer <davecramer@gmail.com>
Date: Tue, 20 Feb 2024 10:01:14 -0500
Subject: [PATCH] Merge pull request from GHSA-24rp-q3w6-vc56
* SQL Injection via line comment generation for 42_4_x
* fix: Add parentheses around NULL parameter values in simple query mode
* simplify code, handle binary and add tests
---------
Co-authored-by: Sehrope Sarkuni <sehrope@jackdb.com>
---
.../core/v3/SimpleParameterList.java | 69 +++++---
.../jdbc/ParameterInjectionTest.java | 155 +++++++++++++-----
2 files changed, 162 insertions(+), 62 deletions(-)
diff --git a/src/main/java/org/postgresql/core/v3/SimpleParameterList.java b/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
index 95cdaa4..d2d27fd 100644
--- a/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
+++ b/src/main/java/org/postgresql/core/v3/SimpleParameterList.java
@@ -202,7 +202,7 @@ class SimpleParameterList implements V3ParameterList {
* {}
* </pre>
**/
- private static String quoteAndCast(String text, String type, boolean standardConformingStrings) {
+ private static String quoteAndCast(String text, /* @Nullable */ String type, boolean standardConformingStrings) {
StringBuilder sb = new StringBuilder((text.length() + 10) / 10 * 11); // Add 10% for escaping.
sb.append("('");
try {
@@ -233,35 +233,47 @@ class SimpleParameterList implements V3ParameterList {
return "?";
} else if (paramValue == NULL_OBJECT) {
return "(NULL)";
- } else if ((flags[index] & BINARY) == BINARY) {
+ }
+ String textValue;
+ String type;
+ if ((flags[index] & BINARY) == BINARY) {
// handle some of the numeric types
-
switch (paramTypes[index]) {
case Oid.INT2:
short s = ByteConverter.int2((byte[]) paramValue, 0);
- return quoteAndCast(Short.toString(s), "int2", standardConformingStrings);
+ textValue = Short.toString(s);
+ type = "int2";
+ break;
case Oid.INT4:
int i = ByteConverter.int4((byte[]) paramValue, 0);
- return quoteAndCast(Integer.toString(i), "int4", standardConformingStrings);
+ textValue = Integer.toString(i);
+ type = "int4";
+ break;
case Oid.INT8:
long l = ByteConverter.int8((byte[]) paramValue, 0);
- return quoteAndCast(Long.toString(l), "int8", standardConformingStrings);
+ textValue = Long.toString(l);
+ type = "int8";
+ break;
case Oid.FLOAT4:
float f = ByteConverter.float4((byte[]) paramValue, 0);
if (Float.isNaN(f)) {
return "('NaN'::real)";
}
- return quoteAndCast(Float.toString(f), "float", standardConformingStrings);
+ textValue = Float.toString(f);
+ type = "real";
+ break;
case Oid.FLOAT8:
double d = ByteConverter.float8((byte[]) paramValue, 0);
if (Double.isNaN(d)) {
return "('NaN'::double precision)";
}
- return quoteAndCast(Double.toString(d), "double precision", standardConformingStrings);
+ textValue = Double.toString(d);
+ type = "double precision";
+ break;
case Oid.NUMERIC:
Number n = ByteConverter.numeric((byte[]) paramValue);
@@ -269,44 +281,55 @@ class SimpleParameterList implements V3ParameterList {
assert ((Double) n).isNaN();
return "('NaN'::numeric)";
}
- return n.toString();
+ textValue = n.toString();
+ type = "numeric";
+ break;
case Oid.UUID:
- String uuid =
+ textValue =
new UUIDArrayAssistant().buildElement((byte[]) paramValue, 0, 16).toString();
- return quoteAndCast(uuid, "uuid", standardConformingStrings);
+ type = "uuid";
+ break;
case Oid.POINT:
PGpoint pgPoint = new PGpoint();
pgPoint.setByteValue((byte[]) paramValue, 0);
- return quoteAndCast(pgPoint.toString(), "point", standardConformingStrings);
+ textValue = pgPoint.toString();
+ type = "point";
+ break;
case Oid.BOX:
PGbox pgBox = new PGbox();
pgBox.setByteValue((byte[]) paramValue, 0);
- return quoteAndCast(pgBox.toString(), "box", standardConformingStrings);
+ textValue = pgBox.toString();
+ type = "box";
+ break;
+
+ default:
+ return "?";
}
- return "?";
} else {
- String param = paramValue.toString();
+ textValue = paramValue.toString();
int paramType = paramTypes[index];
if (paramType == Oid.TIMESTAMP) {
- return quoteAndCast(param, "timestamp", standardConformingStrings);
+ type = "timestamp";
} else if (paramType == Oid.TIMESTAMPTZ) {
- return quoteAndCast(param, "timestamp with time zone", standardConformingStrings);
+ type = "timestamp with time zone";
} else if (paramType == Oid.TIME) {
- return quoteAndCast(param, "time", standardConformingStrings);
+ type = "time";
} else if (paramType == Oid.TIMETZ) {
- return quoteAndCast(param, "time with time zone", standardConformingStrings);
+ type = "time with time zone";
} else if (paramType == Oid.DATE) {
- return quoteAndCast(param, "date", standardConformingStrings);
+ type = "date";
} else if (paramType == Oid.INTERVAL) {
- return quoteAndCast(param, "interval", standardConformingStrings);
+ type = "interval";
} else if (paramType == Oid.NUMERIC) {
- return quoteAndCast(param, "numeric", standardConformingStrings);
+ type = "numeric";
+ } else {
+ type = null;
}
- return quoteAndCast(param, null, standardConformingStrings);
}
+ return quoteAndCast(textValue, type, standardConformingStrings);
}
@Override
diff --git a/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java b/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
index 2a33acd..10c0af3 100644
--- a/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
+++ b/src/test/java/org/postgresql/jdbc/ParameterInjectionTest.java
@@ -12,56 +12,133 @@ import org.postgresql.test.TestUtil;
import org.junit.jupiter.api.Test;
+import java.math.BigDecimal;
import java.sql.Connection;
import java.sql.PreparedStatement;
import java.sql.ResultSet;
+import java.sql.SQLException;
public class ParameterInjectionTest {
- @Test
- public void negateParameter() throws Exception {
- try (Connection conn = TestUtil.openDB()) {
- PreparedStatement stmt = conn.prepareStatement("SELECT -?");
+ private interface ParameterBinder {
+ void bind(PreparedStatement stmt) throws SQLException;
+ }
- stmt.setInt(1, 1);
- try (ResultSet rs = stmt.executeQuery()) {
- assertTrue(rs.next());
- assertEquals(1, rs.getMetaData().getColumnCount(), "number of result columns must match");
- int value = rs.getInt(1);
- assertEquals(-1, value, "Input value 1");
- }
+ private void testParamInjection(ParameterBinder bindPositiveOne, ParameterBinder bindNegativeOne)
+ throws SQLException {
+ try (Connection conn = TestUtil.openDB()) {
+ {
+ PreparedStatement stmt = conn.prepareStatement("SELECT -?");
+ bindPositiveOne.bind(stmt);
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next());
+ assertEquals(1, rs.getMetaData().getColumnCount(),
+ "number of result columns must match");
+ int value = rs.getInt(1);
+ assertEquals(-1, value);
+ }
+ bindNegativeOne.bind(stmt);
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next());
+ assertEquals(1, rs.getMetaData().getColumnCount(),
+ "number of result columns must match");
+ int value = rs.getInt(1);
+ assertEquals(1, value);
+ }
+ }
+ {
+ PreparedStatement stmt = conn.prepareStatement("SELECT -?, ?");
+ bindPositiveOne.bind(stmt);
+ stmt.setString(2, "\nWHERE false --");
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next(), "ResultSet should contain a row");
+ assertEquals(2, rs.getMetaData().getColumnCount(),
+ "rs.getMetaData().getColumnCount(");
+ int value = rs.getInt(1);
+ assertEquals(-1, value);
+ }
- stmt.setInt(1, -1);
- try (ResultSet rs = stmt.executeQuery()) {
- assertTrue(rs.next());
- assertEquals(1, rs.getMetaData().getColumnCount(), "number of result columns must match");
- int value = rs.getInt(1);
- assertEquals(1, value, "Input value -1");
- }
+ bindNegativeOne.bind(stmt);
+ stmt.setString(2, "\nWHERE false --");
+ try (ResultSet rs = stmt.executeQuery()) {
+ assertTrue(rs.next(), "ResultSet should contain a row");
+ assertEquals(2, rs.getMetaData().getColumnCount(), "rs.getMetaData().getColumnCount(");
+ int value = rs.getInt(1);
+ assertEquals(1, value);
}
+
+ }
}
+ }
- @Test
- public void negateParameterWithContinuation() throws Exception {
- try (Connection conn = TestUtil.openDB()) {
- PreparedStatement stmt = conn.prepareStatement("SELECT -?, ?");
+ @Test
+ public void handleInt2() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setShort(1, (short) 1);
+ },
+ stmt -> {
+ stmt.setShort(1, (short) -1);
+ }
+ );
+ }
- stmt.setInt(1, 1);
- stmt.setString(2, "\nWHERE false --");
- try (ResultSet rs = stmt.executeQuery()) {
- assertTrue(rs.next(), "ResultSet should contain a row");
- assertEquals(2, rs.getMetaData().getColumnCount(), "rs.getMetaData().getColumnCount(");
- int value = rs.getInt(1);
- assertEquals(-1, value);
- }
+ @Test
+ public void handleInt4() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setInt(1, 1);
+ },
+ stmt -> {
+ stmt.setInt(1, -1);
+ }
+ );
+ }
- stmt.setInt(1, -1);
- stmt.setString(2, "\nWHERE false --");
- try (ResultSet rs = stmt.executeQuery()) {
- assertTrue(rs.next(), "ResultSet should contain a row");
- assertEquals(2, rs.getMetaData().getColumnCount(), "rs.getMetaData().getColumnCount(");
- int value = rs.getInt(1);
- assertEquals(1, value);
- }
+ @Test
+ public void handleBigInt() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setLong(1, (long) 1);
+ },
+ stmt -> {
+ stmt.setLong(1, (long) -1);
}
- }
+ );
+ }
+
+ @Test
+ public void handleNumeric() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setBigDecimal(1, new BigDecimal("1"));
+ },
+ stmt -> {
+ stmt.setBigDecimal(1, new BigDecimal("-1"));
+ }
+ );
+ }
+
+ @Test
+ public void handleFloat() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setFloat(1, 1);
+ },
+ stmt -> {
+ stmt.setFloat(1, -1);
+ }
+ );
+ }
+
+ @Test
+ public void handleDouble() throws SQLException {
+ testParamInjection(
+ stmt -> {
+ stmt.setDouble(1, 1);
+ },
+ stmt -> {
+ stmt.setDouble(1, -1);
+ }
+ );
+ }
}
--
2.33.0

View File

@ -1,12 +1,16 @@
Name: postgresql-jdbc
Summary: Postgresql JDBC Driver
Version: 42.4.1
Release: 2
Release: 3
License: BSD
URL: http://jdbc.postgresql.org/
Source0: https://repo1.maven.org/maven2/org/postgresql/postgresql/%{version}/postgresql-%{version}-jdbc-src.tar.gz
Patch0: CVE-2022-41946.patch
# https://github.com/pgjdbc/pgjdbc/commit/e479be16967ae20af1bd57187738d5243052bbee
Patch1: CVE-2024-1597-1.patch
# https://github.com/pgjdbc/pgjdbc/commit/fe002b31f2c7dcf7e2fe75fe7fd18df4e4503abf
Patch2: CVE-2024-1597-2.patch
BuildRequires: maven-local java-comment-preprocessor properties-maven-plugin classloader-leak-test-framework
BuildRequires: maven-enforcer-plugin maven-plugin-bundle maven-plugin-build-helper java-devel >= 1.8
@ -40,6 +44,8 @@ This package contains the API Documentation for %{name}.
%setup -c -q
mv postgresql-%{version}-jdbc-src/* .
%patch0 -p1
%patch1 -p1
%patch2 -p1
find -type f \( -name "*.jar" -or -name "*.class" \) | xargs rm -f
%pom_xpath_remove "pom:plugin[pom:artifactId = 'maven-shade-plugin']"
%mvn_file org.postgresql:postgresql %{name}/postgresql %{name} postgresql
@ -80,6 +86,9 @@ find %{_buildrootdir} -name "%{name}.xml" | xargs sed -i '/pgjdbc-aggregate.pom<
%doc README.md
%changelog
* Mon Feb 26 2024 yaoxin <yao_xin001@hoperun.com> - 42.4.1-3
- Fix CVE-2024-1597
* Fri Jun 16 2023 yaoxin <yao_xin001@hoperun.com> - 42.4.1-2
- Fix CVE-2022-41946