add CVE-2016-0773 patch for avoiding attackers to cause a denial
of service (infinite loop or buffer overflow and crash)
via a large Unicode character range in a regular expression.
Patch comes from:
http://git.postgresql.org/gitweb/?p=postgresql.git;a=summary
commit 3bb3f42f3749d40b8d4de65871e8d828b18d4a45

Signed-off-by: Zhixiong Chi <zhixiong....@windriver.com>
---
 .../files/postgresql-CVE-2016-0773.patch           | 222 +++++++++++++++++++++
 meta-oe/recipes-support/postgresql/postgresql.inc  |   1 +
 2 files changed, 223 insertions(+)
 create mode 100644 
meta-oe/recipes-support/postgresql/files/postgresql-CVE-2016-0773.patch

diff --git 
a/meta-oe/recipes-support/postgresql/files/postgresql-CVE-2016-0773.patch 
b/meta-oe/recipes-support/postgresql/files/postgresql-CVE-2016-0773.patch
new file mode 100644
index 0000000..0fc9082
--- /dev/null
+++ b/meta-oe/recipes-support/postgresql/files/postgresql-CVE-2016-0773.patch
@@ -0,0 +1,222 @@
+From 3bb3f42f3749d40b8d4de65871e8d828b18d4a45 Mon Sep 17 00:00:00 2001
+From: Tom Lane <t...@sss.pgh.pa.us>
+Date: Mon, 8 Feb 2016 10:25:40 -0500
+Subject: [PATCH] Fix some regex issues with out-of-range characters and large
+ char ranges.
+
+Previously, our regex code defined CHR_MAX as 0xfffffffe, which is a
+bad choice because it is outside the range of type "celt" (int32).
+Characters approaching that limit could lead to infinite loops in logic
+such as "for (c = a; c <= b; c++)" where c is of type celt but the
+range bounds are chr.  Such loops will work safely only if CHR_MAX+1
+is representable in celt, since c must advance to beyond b before the
+loop will exit.
+
+Fortunately, there seems no reason not to restrict CHR_MAX to 0x7ffffffe.
+It's highly unlikely that Unicode will ever assign codes that high, and
+none of our other backend encodings need characters beyond that either.
+
+In addition to modifying the macro, we have to explicitly enforce character
+range restrictions on the values of \u, \U, and \x escape sequences, else
+the limit is trivially bypassed.
+
+Also, the code for expanding case-independent character ranges in bracket
+expressions had a potential integer overflow in its calculation of the
+number of characters it could generate, which could lead to allocating too
+small a character vector and then overwriting memory.  An attacker with the
+ability to supply arbitrary regex patterns could easily cause transient DOS
+via server crashes, and the possibility for privilege escalation has not
+been ruled out.
+
+Quite aside from the integer-overflow problem, the range expansion code was
+unnecessarily inefficient in that it always produced a result consisting of
+individual characters, abandoning the knowledge that we had a range to
+start with.  If the input range is large, this requires excessive memory.
+Change it so that the original range is reported as-is, and then we add on
+any case-equivalent characters that are outside that range.  With this
+approach, we can bound the number of individual characters allowed without
+sacrificing much.  This patch allows at most 100000 individual characters,
+which I believe to be more than the number of case pairs existing in
+Unicode, so that the restriction will never be hit in practice.
+
+It's still possible for range() to take awhile given a large character code
+range, so also add statement-cancel detection to its loop.  The downstream
+function dovec() also lacked cancel detection, and could take a long time
+given a large output from range().
+
+Per fuzz testing by Greg Stark.  Back-patch to all supported branches.
+
+Security: CVE-2016-0773
+
+Upstream-Status: Backport
+
+Signed-off-by: Tom Lane <t...@sss.pgh.pa.us>
+Signed-off-by: Zhixiong Chi <zhixiong....@windriver.com>
+
+Index: postgresql-9.4.5/src/backend/regex/regc_lex.c
+===================================================================
+--- postgresql-9.4.5.orig/src/backend/regex/regc_lex.c 2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/backend/regex/regc_lex.c      2016-03-10 
10:29:57.045784317 +0800
+@@ -792,13 +792,13 @@
+                       break;
+               case CHR('u'):
+                       c = lexdigits(v, 16, 4, 4);
+-                      if (ISERR())
++                      if (ISERR() || c < CHR_MIN || c > CHR_MAX)
+                               FAILW(REG_EESCAPE);
+                       RETV(PLAIN, c);
+                       break;
+               case CHR('U'):
+                       c = lexdigits(v, 16, 8, 8);
+-                      if (ISERR())
++                      if (ISERR() || c < CHR_MIN || c > CHR_MAX)
+                               FAILW(REG_EESCAPE);
+                       RETV(PLAIN, c);
+                       break;
+@@ -816,7 +816,7 @@
+               case CHR('x'):
+                       NOTE(REG_UUNPORT);
+                       c = lexdigits(v, 16, 1, 255);           /* REs >255 
long outside spec */
+-                      if (ISERR())
++                      if (ISERR() || c < CHR_MIN || c > CHR_MAX)
+                               FAILW(REG_EESCAPE);
+                       RETV(PLAIN, c);
+                       break;
+@@ -872,6 +872,9 @@
+ 
+ /*
+  * lexdigits - slurp up digits and return chr value
++ *
++ * This does not account for overflow; callers should range-check the result
++ * if maxlen is large enough to make that possible.
+  */
+ static chr                                            /* chr value; errors 
signalled via ERR */
+ lexdigits(struct vars * v,
+Index: postgresql-9.4.5/src/backend/regex/regc_locale.c
+===================================================================
+--- postgresql-9.4.5.orig/src/backend/regex/regc_locale.c      2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/backend/regex/regc_locale.c   2016-03-10 
10:34:28.757781726 +0800
+@@ -408,8 +408,7 @@
+       int                     nchrs;
+       struct cvec *cv;
+       celt            c,
+-                              lc,
+-                              uc;
++                              cc;
+ 
+       if (a != b && !before(a, b))
+       {
+@@ -427,24 +426,48 @@
+ 
+       /*
+        * When case-independent, it's hard to decide when cvec ranges are 
usable,
+-       * so for now at least, we won't try.  We allocate enough space for two
+-       * case variants plus a little extra for the two title case variants.
++       * so for now at least, we won't try.  We use a range for the originally
++       * specified chrs and then add on any case-equivalents that are outside
++       * that range as individual chrs.
++       *
++       * To ensure sane behavior if someone specifies a very large range, 
limit
++       * the allocation size to 100000 chrs (arbitrary) and check for overrun
++       * inside the loop below.
+        */
+ 
+-      nchrs = (b - a + 1) * 2 + 4;
+-
+-      cv = getcvec(v, nchrs, 0);
++      cv = getcvec(v, nchrs, 1);
+       NOERRN();
++      addrange(cv, a, b);
+ 
+       for (c = a; c <= b; c++)
+       {
+-              addchr(cv, c);
+-              lc = pg_wc_tolower((chr) c);
+-              if (c != lc)
+-                      addchr(cv, lc);
+-              uc = pg_wc_toupper((chr) c);
+-              if (c != uc)
+-                      addchr(cv, uc);
++              cc = pg_wc_tolower((chr) c);
++              if (cc != c &&
++                      (before(cc, a) || before(b, cc)))
++              {
++                      if (cv->nchrs >= cv->chrspace)
++                      {
++                              ERR(REG_ETOOBIG);
++                              return NULL;
++                      }
++                      addchr(cv, cc);
++              }
++              cc = pg_wc_toupper((chr) c);
++              if (cc != c &&
++                      (before(cc, a) || before(b, cc)))
++              {
++                      if (cv->nchrs >= cv->chrspace)
++                      {
++                              ERR(REG_ETOOBIG);
++                              return NULL;
++                      }
++                      addchr(cv, cc);
++              }
++              if (CANCEL_REQUESTED(v->re))
++              {
++                      ERR(REG_CANCEL);
++                      return NULL;
++              }
+       }
+ 
+       return cv;
+Index: postgresql-9.4.5/src/backend/regex/regcomp.c
+===================================================================
+--- postgresql-9.4.5.orig/src/backend/regex/regcomp.c  2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/backend/regex/regcomp.c       2016-03-10 
10:35:25.397781185 +0800
+@@ -1569,6 +1569,7 @@
+       {
+               ch = *p;
+               newarc(v->nfa, PLAIN, subcolor(v->cm, ch), lp, rp);
++              NOERR();
+       }
+ 
+       /* and the ranges */
+@@ -1578,6 +1579,7 @@
+               to = *(p + 1);
+               if (from <= to)
+                       subrange(v, from, to, lp, rp);
++              NOERR();
+       }
+ }
+ 
+Index: postgresql-9.4.5/src/include/regex/regcustom.h
+===================================================================
+--- postgresql-9.4.5.orig/src/include/regex/regcustom.h        2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/include/regex/regcustom.h     2016-03-10 
10:37:09.989780188 +0800
+@@ -65,7 +65,8 @@
+ #define DIGITVAL(c) ((c)-'0') /* turn chr digit into its value */
+ #define CHRBITS 32                            /* bits in a chr; must not use 
sizeof */
+ #define CHR_MIN 0x00000000            /* smallest and largest chr; the value 
*/
+-#define CHR_MAX 0xfffffffe            /* CHR_MAX-CHR_MIN+1 should fit in uchr 
*/
++#define CHR_MAX 0x7ffffffe            /* CHR_MAX-CHR_MIN+1 must fit in an 
int, and
++                                                               * CHR_MAX+1 
must fit in both chr and celt */
+ 
+ /* functions operating on chr */
+ #define iscalnum(x) pg_wc_isalnum(x)
+Index: postgresql-9.4.5/src/test/regress/expected/regex.out
+===================================================================
+--- postgresql-9.4.5.orig/src/test/regress/expected/regex.out  2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/test/regress/expected/regex.out       2016-03-10 
10:38:28.821779436 +0800
+@@ -222,3 +222,5 @@
+  t
+ (1 row)
+ 
++select 'a' ~ '\x7fffffff';  -- invalid chr code
++ERROR:  invalid regular expression: invalid escape \ sequence
+Index: postgresql-9.4.5/src/test/regress/sql/regex.sql
+===================================================================
+--- postgresql-9.4.5.orig/src/test/regress/sql/regex.sql       2015-10-06 
03:12:06.000000000 +0800
++++ postgresql-9.4.5/src/test/regress/sql/regex.sql    2016-03-10 
10:38:57.845779159 +0800
+@@ -57,3 +57,4 @@
+ select 'a' ~ '.. ()|\1';
+ select 'a' ~ '()*\1';
+ select 'a' ~ '()+\1';
++select 'a' ~ '\x7fffffff';  -- invalid chr code
diff --git a/meta-oe/recipes-support/postgresql/postgresql.inc 
b/meta-oe/recipes-support/postgresql/postgresql.inc
index 06e601f..806c638 100644
--- a/meta-oe/recipes-support/postgresql/postgresql.inc
+++ b/meta-oe/recipes-support/postgresql/postgresql.inc
@@ -32,6 +32,7 @@ SRC_URI = 
"http://ftp.postgresql.org/pub/source/v${PV}/${BP}.tar.bz2 \
     file://postgresql.service \
     file://0001-Use-pkg-config-for-libxml2-detection.patch \
     file://postgresql-CVE-2016-0766.patch \
+    file://postgresql-CVE-2016-0773.patch \
 "
 
 LEAD_SONAME = "libpq.so"
-- 
1.9.1

-- 
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel

Reply via email to