pgsql: Check return values of sensitive system library calls.

Поиск
Список
Период
Сортировка
От Noah Misch
Тема pgsql: Check return values of sensitive system library calls.
Дата
Msg-id E1YuLeF-000679-0D@gemulon.postgresql.org
обсуждение исходный текст
Список pgsql-committers
Check return values of sensitive system library calls.

PostgreSQL already checked the vast majority of these, missing this
handful that nearly cannot fail.  If putenv() failed with ENOMEM in
pg_GSS_recvauth(), authentication would proceed with the wrong keytab
file.  If strftime() returned zero in cache_locale_time(), using the
unspecified buffer contents could lead to information exposure or a
crash.  Back-patch to 9.0 (all supported versions).

Other unchecked calls to these functions, especially those in frontend
code, pose negligible security concern.  This patch does not address
them.  Nonetheless, it is always better to check return values whose
specification provides for indicating an error.

In passing, fix an off-by-one error in strftime_win32()'s invocation of
WideCharToMultiByte().  Upon retrieving a value of exactly MAX_L10N_DATA
bytes, strftime_win32() would overrun the caller's buffer by one byte.
MAX_L10N_DATA is chosen to exceed the length of every possible value, so
the vulnerable scenario probably does not arise.

Security: CVE-2015-3166

Branch
------
REL9_1_STABLE

Details
-------
http://git.postgresql.org/pg/commitdiff/2cb9f2cabe3071f1cbd25ab8fe3cbc0b8d1a83d3

Modified Files
--------------
src/backend/libpq/auth.c          |    7 ++--
src/backend/utils/adt/pg_locale.c |   74 ++++++++++++++++++++++---------------
2 files changed, 48 insertions(+), 33 deletions(-)


В списке pgsql-committers по дате отправления:

Предыдущее
От: Noah Misch
Дата:
Сообщение: pgsql: Add error-throwing wrappers for the printf family of functions.
Следующее
От: Noah Misch
Дата:
Сообщение: pgsql: Prevent a double free by not reentering be_tls_close().