aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndres Freund <andres@anarazel.de>2025-02-14 17:44:28 -0500
committerAndres Freund <andres@anarazel.de>2025-02-14 18:09:25 -0500
commit985908df18116b5d2a496b1581c337aab23ea64e (patch)
tree4a4c404c25f7f3da7d12294e0c138f99061a7e35
parent971566e9650be7defdafa19b6112408233ca3c6b (diff)
downloadpostgresql-985908df18116b5d2a496b1581c337aab23ea64e.tar.gz
postgresql-985908df18116b5d2a496b1581c337aab23ea64e.zip
Fix PQescapeLiteral()/PQescapeIdentifier() length handling
In 5dc1e42b4fa I fixed bugs in various escape functions, unfortunately as part of that I introduced a new bug in PQescapeLiteral()/PQescapeIdentifier(). The bug is that I made PQescapeInternal() just use strlen(), rather than taking the specified input length into account. That's bad, because it can lead to including input that wasn't intended to be included (in case len is shorter than null termination of the string) and because it can lead to reading invalid memory if the input string is not null terminated. Expand test_escape to this kind of bug: a) for escape functions with length support, append data that should not be escaped and check that it is not b) add valgrind requests to detect access of bytes that should not be touched Author: Tom Lane <tgl@sss.pgh.pa.us> Author: Andres Freund <andres@anarazel.de Reviewed-by: Tom Lane <tgl@sss.pgh.pa.us> Reviewed-by: Noah Misch <noah@leadboat.com> Discussion: https://postgr.es/m/Z64jD3u46gObCo1p@pryzbyj2023 Backpatch: 13
-rw-r--r--src/interfaces/libpq/fe-exec.c4
-rw-r--r--src/test/modules/test_escape/test_escape.c78
2 files changed, 77 insertions, 5 deletions
diff --git a/src/interfaces/libpq/fe-exec.c b/src/interfaces/libpq/fe-exec.c
index 8d5ad9cdbe8..afaf8ca9124 100644
--- a/src/interfaces/libpq/fe-exec.c
+++ b/src/interfaces/libpq/fe-exec.c
@@ -4104,7 +4104,7 @@ PQescapeInternal(PGconn *conn, const char *str, size_t len, bool as_ident)
char *rp;
int num_quotes = 0; /* single or double, depending on as_ident */
int num_backslashes = 0;
- size_t input_len = strlen(str);
+ size_t input_len = strnlen(str, len);
size_t result_size;
char quote_char = as_ident ? '"' : '\'';
bool validated_mb = false;
@@ -4153,7 +4153,7 @@ PQescapeInternal(PGconn *conn, const char *str, size_t len, bool as_ident)
if (!validated_mb)
{
if (pg_encoding_verifymbstr(conn->client_encoding, s, remaining)
- != strlen(s))
+ != remaining)
{
appendPQExpBufferStr(&conn->errorMessage,
libpq_gettext("invalid multibyte character\n"));
diff --git a/src/test/modules/test_escape/test_escape.c b/src/test/modules/test_escape/test_escape.c
index 3ed70436155..09303a00a20 100644
--- a/src/test/modules/test_escape/test_escape.c
+++ b/src/test/modules/test_escape/test_escape.c
@@ -17,6 +17,7 @@
#include "getopt_long.h"
#include "libpq-fe.h"
#include "mb/pg_wchar.h"
+#include "utils/memdebug.h"
typedef struct pe_test_config
@@ -56,6 +57,11 @@ typedef struct pe_test_escape_func
*/
bool supports_only_ascii_overlap;
+ /*
+ * Does the escape function have a length input?
+ */
+ bool supports_input_length;
+
bool (*escape) (PGconn *conn, PQExpBuffer target,
const char *unescaped, size_t unescaped_len,
PQExpBuffer escape_err);
@@ -234,21 +240,25 @@ static pe_test_escape_func pe_test_escape_funcs[] =
{
.name = "PQescapeLiteral",
.reports_errors = true,
+ .supports_input_length = true,
.escape = escape_literal,
},
{
.name = "PQescapeIdentifier",
.reports_errors = true,
+ .supports_input_length = true,
.escape = escape_identifier
},
{
.name = "PQescapeStringConn",
.reports_errors = true,
+ .supports_input_length = true,
.escape = escape_string_conn
},
{
.name = "PQescapeString",
.reports_errors = false,
+ .supports_input_length = true,
.escape = escape_string
},
{
@@ -256,6 +266,7 @@ static pe_test_escape_func pe_test_escape_funcs[] =
.reports_errors = false,
.supports_only_valid = true,
.supports_only_ascii_overlap = true,
+ .supports_input_length = true,
.escape = escape_replace
},
{
@@ -272,6 +283,7 @@ static pe_test_escape_func pe_test_escape_funcs[] =
#define TV(enc, string) {.client_encoding = (enc), .escape=string, .escape_len=sizeof(string) - 1, }
+#define TV_LEN(enc, string, len) {.client_encoding = (enc), .escape=string, .escape_len=len, }
static pe_test_vector pe_test_vectors[] =
{
/* expected to work sanity checks */
@@ -359,6 +371,15 @@ static pe_test_vector pe_test_vectors[] =
TV("mule_internal", "\\\x9c';\0;"),
TV("sql_ascii", "1\xC0'"),
+
+ /*
+ * Testcases that are not null terminated for the specified input length.
+ * That's interesting to verify that escape functions don't read beyond
+ * the intended input length.
+ */
+ TV_LEN("gbk", "\x80", 1),
+ TV_LEN("UTF-8", "\xC3\xb6 ", 1),
+ TV_LEN("UTF-8", "\xC3\xb6 ", 2),
};
@@ -521,6 +542,7 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
{
PQExpBuffer testname;
PQExpBuffer details;
+ PQExpBuffer raw_buf;
PQExpBuffer escape_buf;
PQExpBuffer escape_err;
size_t input_encoding_validlen;
@@ -534,6 +556,7 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
escape_err = createPQExpBuffer();
testname = createPQExpBuffer();
details = createPQExpBuffer();
+ raw_buf = createPQExpBuffer();
escape_buf = createPQExpBuffer();
if (ef->supports_only_ascii_overlap &&
@@ -567,8 +590,8 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
input_encoding0_validlen = pg_encoding_verifymbstr(PQclientEncoding(tc->conn),
tv->escape,
- strlen(tv->escape));
- input_encoding0_valid = input_encoding0_validlen == strlen(tv->escape);
+ strnlen(tv->escape, tv->escape_len));
+ input_encoding0_valid = input_encoding0_validlen == strnlen(tv->escape, tv->escape_len);
appendPQExpBuffer(details, "#\t input encoding valid till 0: %d\n",
input_encoding0_valid);
@@ -580,9 +603,45 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
goto out;
+ /*
+ * Put the to-be-escaped data into a buffer, so that we
+ *
+ * a) can mark memory beyond end of the string as inaccessible when using
+ * valgrind
+ *
+ * b) can append extra data beyond the length passed to the escape
+ * function, to verify that that data is not processed.
+ *
+ * TODO: Should we instead/additionally escape twice, once with unmodified
+ * and once with appended input? That way we could compare the two.
+ */
+ appendBinaryPQExpBuffer(raw_buf, tv->escape, tv->escape_len);
+
+#define NEVER_ACCESS_STR "\xff never-to-be-touched"
+ if (ef->supports_input_length)
+ {
+ /*
+ * Append likely invalid string that does *not* contain a null byte
+ * (which'd prevent some invalid accesses to later memory).
+ */
+ appendPQExpBufferStr(raw_buf, NEVER_ACCESS_STR);
+
+ VALGRIND_MAKE_MEM_NOACCESS(&raw_buf->data[tv->escape_len],
+ raw_buf->len - tv->escape_len);
+ }
+ else
+ {
+ /* append invalid string, after \0 */
+ appendPQExpBufferChar(raw_buf, 0);
+ appendPQExpBufferStr(raw_buf, NEVER_ACCESS_STR);
+
+ VALGRIND_MAKE_MEM_NOACCESS(&raw_buf->data[tv->escape_len + 1],
+ raw_buf->len - tv->escape_len - 1);
+ }
+
/* call the to-be-tested escape function */
escape_success = ef->escape(tc->conn, escape_buf,
- tv->escape, tv->escape_len,
+ raw_buf->data, tv->escape_len,
escape_err);
if (!escape_success)
{
@@ -592,6 +651,8 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
if (escape_buf->len > 0)
{
+ bool contains_never;
+
appendPQExpBuffer(details, "#\t escaped string: %zd bytes: ", escape_buf->len);
escapify(details, escape_buf->data, escape_buf->len);
appendPQExpBufferChar(details, '\n');
@@ -603,6 +664,16 @@ test_one_vector_escape(pe_test_config *tc, const pe_test_vector *tv, const pe_te
appendPQExpBuffer(details, "#\t escape encoding valid: %d\n",
escape_encoding_valid);
+
+ /*
+ * Verify that no data beyond the end of the input is included in the
+ * escaped string. It'd be better to use something like memmem()
+ * here, but that's not available everywhere.
+ */
+ contains_never = strstr(escape_buf->data, NEVER_ACCESS_STR) == NULL;
+ report_result(tc, contains_never, testname, details,
+ "escaped data beyond end of input",
+ contains_never ? "no" : "all secrets revealed");
}
else
{
@@ -693,6 +764,7 @@ out:
destroyPQExpBuffer(details);
destroyPQExpBuffer(testname);
destroyPQExpBuffer(escape_buf);
+ destroyPQExpBuffer(raw_buf);
}
static void