mirror of
https://git.postgresql.org/git/postgresql.git
synced 2024-12-21 08:29:39 +08:00
1d812c8b05
Certain short salts crashed the backend or disclosed a few bytes of backend memory. For existing salt-induced error conditions, emit a message saying as much. Back-patch to 9.0 (all supported versions). Josh Kupershmidt Security: CVE-2015-5288
27 lines
658 B
SQL
27 lines
658 B
SQL
--
|
|
-- crypt() and gen_salt(): bcrypt
|
|
--
|
|
|
|
SELECT crypt('', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
|
|
|
|
SELECT crypt('foox', '$2a$06$RQiOJ.3ELirrXwxIZY8q0O');
|
|
|
|
-- error, salt too short:
|
|
SELECT crypt('foox', '$2a$');
|
|
|
|
-- error, first digit of count in salt invalid
|
|
SELECT crypt('foox', '$2a$40$RQiOJ.3ELirrXwxIZY8q0O');
|
|
|
|
-- error, count in salt too small
|
|
SELECT crypt('foox', '$2a$00$RQiOJ.3ELirrXwxIZY8q0O');
|
|
|
|
CREATE TABLE ctest (data text, res text, salt text);
|
|
INSERT INTO ctest VALUES ('password', '', '');
|
|
|
|
UPDATE ctest SET salt = gen_salt('bf', 8);
|
|
UPDATE ctest SET res = crypt(data, salt);
|
|
SELECT res = crypt(data, res) AS "worked"
|
|
FROM ctest;
|
|
|
|
DROP TABLE ctest;
|