mirror of
https://git.postgresql.org/git/postgresql.git
synced 2024-11-21 03:13:05 +08:00
Detect integer overflow while computing new array dimensions.
array_set_element() and related functions allow an array to be enlarged by assigning to subscripts outside the current array bounds. While these places were careful to check that the new bounds are allowable, they neglected to consider the risk of integer overflow in computing the new bounds. In edge cases, we could compute new bounds that are invalid but get past the subsequent checks, allowing bad things to happen. Memory stomps that are potentially exploitable for arbitrary code execution are possible, and so is disclosure of server memory. To fix, perform the hazardous computations using overflow-detecting arithmetic routines, which fortunately exist in all still-supported branches. The test cases added for this generate (after patching) errors that mention the value of MaxArraySize, which is platform-dependent. Rather than introduce multiple expected-files, use psql's VERBOSITY parameter to suppress the printing of the message text. v11 psql lacks that parameter, so omit the tests in that branch. Our thanks to Pedro Gallegos for reporting this problem. Security: CVE-2023-5869
This commit is contained in:
parent
8c6633f4de
commit
c48008f599
@ -23,6 +23,7 @@
|
||||
#include "access/hash.h"
|
||||
#include "access/htup_details.h"
|
||||
#include "catalog/pg_type.h"
|
||||
#include "common/int.h"
|
||||
#include "funcapi.h"
|
||||
#include "libpq/pqformat.h"
|
||||
#include "utils/array.h"
|
||||
@ -2310,22 +2311,38 @@ array_set_element(Datum arraydatum,
|
||||
addedbefore = addedafter = 0;
|
||||
|
||||
/*
|
||||
* Check subscripts
|
||||
* Check subscripts. We assume the existing subscripts passed
|
||||
* ArrayCheckBounds, so that dim[i] + lb[i] can be computed without
|
||||
* overflow. But we must beware of other overflows in our calculations of
|
||||
* new dim[] values.
|
||||
*/
|
||||
if (ndim == 1)
|
||||
{
|
||||
if (indx[0] < lb[0])
|
||||
{
|
||||
addedbefore = lb[0] - indx[0];
|
||||
dim[0] += addedbefore;
|
||||
/* addedbefore = lb[0] - indx[0]; */
|
||||
/* dim[0] += addedbefore; */
|
||||
if (pg_sub_s32_overflow(lb[0], indx[0], &addedbefore) ||
|
||||
pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
lb[0] = indx[0];
|
||||
if (addedbefore > 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
}
|
||||
if (indx[0] >= (dim[0] + lb[0]))
|
||||
{
|
||||
addedafter = indx[0] - (dim[0] + lb[0]) + 1;
|
||||
dim[0] += addedafter;
|
||||
/* addedafter = indx[0] - (dim[0] + lb[0]) + 1; */
|
||||
/* dim[0] += addedafter; */
|
||||
if (pg_sub_s32_overflow(indx[0], dim[0] + lb[0], &addedafter) ||
|
||||
pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
||||
pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
if (addedafter > 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
}
|
||||
@ -2568,14 +2585,23 @@ array_set_element_expanded(Datum arraydatum,
|
||||
addedbefore = addedafter = 0;
|
||||
|
||||
/*
|
||||
* Check subscripts (this logic matches original array_set_element)
|
||||
* Check subscripts (this logic must match array_set_element). We assume
|
||||
* the existing subscripts passed ArrayCheckBounds, so that dim[i] + lb[i]
|
||||
* can be computed without overflow. But we must beware of other
|
||||
* overflows in our calculations of new dim[] values.
|
||||
*/
|
||||
if (ndim == 1)
|
||||
{
|
||||
if (indx[0] < lb[0])
|
||||
{
|
||||
addedbefore = lb[0] - indx[0];
|
||||
dim[0] += addedbefore;
|
||||
/* addedbefore = lb[0] - indx[0]; */
|
||||
/* dim[0] += addedbefore; */
|
||||
if (pg_sub_s32_overflow(lb[0], indx[0], &addedbefore) ||
|
||||
pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
lb[0] = indx[0];
|
||||
dimschanged = true;
|
||||
if (addedbefore > 1)
|
||||
@ -2583,8 +2609,15 @@ array_set_element_expanded(Datum arraydatum,
|
||||
}
|
||||
if (indx[0] >= (dim[0] + lb[0]))
|
||||
{
|
||||
addedafter = indx[0] - (dim[0] + lb[0]) + 1;
|
||||
dim[0] += addedafter;
|
||||
/* addedafter = indx[0] - (dim[0] + lb[0]) + 1; */
|
||||
/* dim[0] += addedafter; */
|
||||
if (pg_sub_s32_overflow(indx[0], dim[0] + lb[0], &addedafter) ||
|
||||
pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
||||
pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
dimschanged = true;
|
||||
if (addedafter > 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
@ -2866,7 +2899,10 @@ array_set_slice(Datum arraydatum,
|
||||
addedbefore = addedafter = 0;
|
||||
|
||||
/*
|
||||
* Check subscripts
|
||||
* Check subscripts. We assume the existing subscripts passed
|
||||
* ArrayCheckBounds, so that dim[i] + lb[i] can be computed without
|
||||
* overflow. But we must beware of other overflows in our calculations of
|
||||
* new dim[] values.
|
||||
*/
|
||||
if (ndim == 1)
|
||||
{
|
||||
@ -2881,18 +2917,31 @@ array_set_slice(Datum arraydatum,
|
||||
errmsg("upper bound cannot be less than lower bound")));
|
||||
if (lowerIndx[0] < lb[0])
|
||||
{
|
||||
if (upperIndx[0] < lb[0] - 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
addedbefore = lb[0] - lowerIndx[0];
|
||||
dim[0] += addedbefore;
|
||||
/* addedbefore = lb[0] - lowerIndx[0]; */
|
||||
/* dim[0] += addedbefore; */
|
||||
if (pg_sub_s32_overflow(lb[0], lowerIndx[0], &addedbefore) ||
|
||||
pg_add_s32_overflow(dim[0], addedbefore, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
lb[0] = lowerIndx[0];
|
||||
if (addedbefore > 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
}
|
||||
if (upperIndx[0] >= (dim[0] + lb[0]))
|
||||
{
|
||||
if (lowerIndx[0] > (dim[0] + lb[0]))
|
||||
/* addedafter = upperIndx[0] - (dim[0] + lb[0]) + 1; */
|
||||
/* dim[0] += addedafter; */
|
||||
if (pg_sub_s32_overflow(upperIndx[0], dim[0] + lb[0], &addedafter) ||
|
||||
pg_add_s32_overflow(addedafter, 1, &addedafter) ||
|
||||
pg_add_s32_overflow(dim[0], addedafter, &dim[0]))
|
||||
ereport(ERROR,
|
||||
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
|
||||
errmsg("array size exceeds the maximum allowed (%d)",
|
||||
(int) MaxArraySize)));
|
||||
if (addedafter > 1)
|
||||
newhasnulls = true; /* will insert nulls */
|
||||
addedafter = upperIndx[0] - (dim[0] + lb[0]) + 1;
|
||||
dim[0] += addedafter;
|
||||
}
|
||||
}
|
||||
else
|
||||
|
@ -64,10 +64,6 @@ ArrayGetOffset0(int n, const int *tup, const int *scale)
|
||||
* This must do overflow checking, since it is used to validate that a user
|
||||
* dimensionality request doesn't overflow what we can handle.
|
||||
*
|
||||
* We limit array sizes to at most about a quarter billion elements,
|
||||
* so that it's not necessary to check for overflow in quite so many
|
||||
* places --- for instance when palloc'ing Datum arrays.
|
||||
*
|
||||
* The multiplication overflow check only works on machines that have int64
|
||||
* arithmetic, but that is nearly all platforms these days, and doing check
|
||||
* divides for those that don't seems way too expensive.
|
||||
@ -78,8 +74,6 @@ ArrayGetNItems(int ndim, const int *dims)
|
||||
int32 ret;
|
||||
int i;
|
||||
|
||||
#define MaxArraySize ((Size) (MaxAllocSize / sizeof(Datum)))
|
||||
|
||||
if (ndim <= 0)
|
||||
return 0;
|
||||
ret = 1;
|
||||
|
@ -69,6 +69,13 @@ struct ExprState;
|
||||
struct ExprContext;
|
||||
|
||||
|
||||
/*
|
||||
* Maximum number of elements in an array. We limit this to at most about a
|
||||
* quarter billion elements, so that it's not necessary to check for overflow
|
||||
* in quite so many places --- for instance when palloc'ing Datum arrays.
|
||||
*/
|
||||
#define MaxArraySize ((Size) (MaxAllocSize / sizeof(Datum)))
|
||||
|
||||
/*
|
||||
* Arrays are varlena objects, so must meet the varlena convention that
|
||||
* the first int32 of the object contains the total object size in bytes.
|
||||
|
Loading…
Reference in New Issue
Block a user