mirror of
				https://github.com/postgres/postgres.git
				synced 2025-11-03 09:13:20 +03:00 
			
		
		
		
	Certain short salts crashed the backend or disclosed a few bytes of backend memory. For existing salt-induced error conditions, emit a message saying as much. Back-patch to 9.0 (all supported versions). Josh Kupershmidt Security: CVE-2015-5288
		
			
				
	
	
		
			27 lines
		
	
	
		
			658 B
		
	
	
	
		
			SQL
		
	
	
	
	
	
			
		
		
	
	
			27 lines
		
	
	
		
			658 B
		
	
	
	
		
			SQL
		
	
	
	
	
	
--
 | 
						|
-- crypt() and gen_salt(): bcrypt
 | 
						|
--
 | 
						|
 | 
						|
SELECT crypt('', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
 | 
						|
 | 
						|
SELECT crypt('foox', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
 | 
						|
 | 
						|
-- error, salt too short:
 | 
						|
SELECT crypt('foox', '$2a$');
 | 
						|
 | 
						|
-- error, first digit of count in salt invalid
 | 
						|
SELECT crypt('foox', '$2a$40$RQiOJ.3ELirrXwxIZY8q0O');
 | 
						|
 | 
						|
-- error, count in salt too small
 | 
						|
SELECT crypt('foox', '$2a$00$RQiOJ.3ELirrXwxIZY8q0O');
 | 
						|
 | 
						|
CREATE TABLE ctest (data text, res text, salt text);
 | 
						|
INSERT INTO ctest VALUES ('password', '', '');
 | 
						|
 | 
						|
UPDATE ctest SET salt = gen_salt('bf', 8);
 | 
						|
UPDATE ctest SET res = crypt(data, salt);
 | 
						|
SELECT res = crypt(data, res) AS "worked"
 | 
						|
FROM ctest;
 | 
						|
 | 
						|
DROP TABLE ctest;
 |