mirror of
https://github.com/postgres/postgres.git
synced 2025-07-30 11:03:19 +03:00
Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation size such that the calculation wrapped to a small positive value when arguments implied a sufficiently-large requirement. Writes past the end of the inadvertent small allocation followed shortly thereafter. Coverity identified the path_in() vulnerability; code inspection led to the rest. In passing, add check_stack_depth() to prevent stack overflow in related functions. Back-patch to 8.4 (all supported versions). The non-comment hstore changes touch code that did not exist in 8.4, so that part stops at 9.0. Noah Misch and Heikki Linnakangas, reviewed by Tom Lane. Security: CVE-2014-0064
This commit is contained in:
@ -9,6 +9,7 @@
|
||||
#include "funcapi.h"
|
||||
#include "libpq/pqformat.h"
|
||||
#include "utils/lsyscache.h"
|
||||
#include "utils/memutils.h"
|
||||
#include "utils/typcache.h"
|
||||
|
||||
#include "hstore.h"
|
||||
@ -437,6 +438,11 @@ hstore_recv(PG_FUNCTION_ARGS)
|
||||
PG_RETURN_POINTER(out);
|
||||
}
|
||||
|
||||
if (pcount < 0 || pcount > MaxAllocSize / sizeof(Pairs))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("number of pairs (%d) exceeds the maximum allowed (%d)",
|
||||
pcount, (int) (MaxAllocSize / sizeof(Pairs)))));
|
||||
pairs = palloc(pcount * sizeof(Pairs));
|
||||
|
||||
for (i = 0; i < pcount; ++i)
|
||||
@ -552,6 +558,13 @@ hstore_from_arrays(PG_FUNCTION_ARGS)
|
||||
TEXTOID, -1, false, 'i',
|
||||
&key_datums, &key_nulls, &key_count);
|
||||
|
||||
/* see discussion in hstoreArrayToPairs() */
|
||||
if (key_count > MaxAllocSize / sizeof(Pairs))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("number of pairs (%d) exceeds the maximum allowed (%d)",
|
||||
key_count, (int) (MaxAllocSize / sizeof(Pairs)))));
|
||||
|
||||
/* value_array might be NULL */
|
||||
|
||||
if (PG_ARGISNULL(1))
|
||||
@ -674,6 +687,13 @@ hstore_from_array(PG_FUNCTION_ARGS)
|
||||
|
||||
count = in_count / 2;
|
||||
|
||||
/* see discussion in hstoreArrayToPairs() */
|
||||
if (count > MaxAllocSize / sizeof(Pairs))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("number of pairs (%d) exceeds the maximum allowed (%d)",
|
||||
count, (int) (MaxAllocSize / sizeof(Pairs)))));
|
||||
|
||||
pairs = palloc(count * sizeof(Pairs));
|
||||
|
||||
for (i = 0; i < count; ++i)
|
||||
@ -805,6 +825,7 @@ hstore_from_record(PG_FUNCTION_ARGS)
|
||||
my_extra->ncolumns = ncolumns;
|
||||
}
|
||||
|
||||
Assert(ncolumns <= MaxTupleAttributeNumber); /* thus, no overflow */
|
||||
pairs = palloc(ncolumns * sizeof(Pairs));
|
||||
|
||||
if (rec)
|
||||
|
Reference in New Issue
Block a user