aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorMichael Paquier <michael@paquier.xyz>2024-11-11 10:19:56 +0900
committerMichael Paquier <michael@paquier.xyz>2024-11-11 10:19:56 +0900
commita5cc4c66719be2ae1eebe92ad97727dc905bbc6d (patch)
tree5ed9775007889f2398d2e0bc4d219b047d1bb8ad /src
parentca19f881b071fa57ee469fbc27b520fbb0c67280 (diff)
downloadpostgresql-a5cc4c66719be2ae1eebe92ad97727dc905bbc6d.tar.gz
postgresql-a5cc4c66719be2ae1eebe92ad97727dc905bbc6d.zip
libpq: Bail out during SSL/GSS negotiation errors
This commit changes libpq so that errors reported by the backend during the protocol negotiation for SSL and GSS are discarded by the client, as these may include bytes that could be consumed by the client and write arbitrary bytes to a client's terminal. A failure with the SSL negotiation now leads to an error immediately reported, without a retry on any other methods allowed, like a fallback to a plaintext connection. A failure with GSS discards the error message received, and we allow a fallback as it may be possible that the error is caused by a connection attempt with a pre-11 server, GSS encryption having been introduced in v12. This was a problem only with v17 and newer versions; older versions discard the error message already in this case, assuming a failure caused by a lack of support for GSS encryption. Author: Jacob Champion Reviewed-by: Peter Eisentraut, Heikki Linnakangas, Michael Paquier Security: CVE-2024-10977 Backpatch-through: 12
Diffstat (limited to 'src')
-rw-r--r--src/interfaces/libpq/fe-connect.c34
1 files changed, 10 insertions, 24 deletions
diff --git a/src/interfaces/libpq/fe-connect.c b/src/interfaces/libpq/fe-connect.c
index e69a5f5be3c..2f87961a71e 100644
--- a/src/interfaces/libpq/fe-connect.c
+++ b/src/interfaces/libpq/fe-connect.c
@@ -3512,22 +3512,12 @@ keep_going: /* We will come back to here until there is
{
/*
* Server failure of some sort, such as failure to
- * fork a backend process. We need to process and
- * report the error message, which might be formatted
- * according to either protocol 2 or protocol 3.
- * Rather than duplicate the code for that, we flip
- * into AWAITING_RESPONSE state and let the code there
- * deal with it. Note we have *not* consumed the "E"
- * byte here.
+ * fork a backend process. Don't bother retrieving
+ * the error message; we should not trust it as the
+ * server has not been authenticated yet.
*/
- conn->status = CONNECTION_AWAITING_RESPONSE;
-
- /*
- * Don't fall back to a plaintext connection after
- * reading the error.
- */
- conn->failed_enc_methods |= conn->allowed_enc_methods & (~conn->current_enc_method);
- goto keep_going;
+ libpq_append_conn_error(conn, "server sent an error response during SSL exchange");
+ goto error_return;
}
else
{
@@ -3611,13 +3601,9 @@ keep_going: /* We will come back to here until there is
{
/*
* Server failure of some sort, possibly protocol
- * version support failure. We need to process and
- * report the error message, which might be formatted
- * according to either protocol 2 or protocol 3.
- * Rather than duplicate the code for that, we flip
- * into AWAITING_RESPONSE state and let the code there
- * deal with it. Note we have *not* consumed the "E"
- * byte here.
+ * version support failure. Don't bother retrieving
+ * the error message; we should not trust it anyway as
+ * the server has not authenticated yet.
*
* Note that unlike on an error response to
* SSLRequest, we allow falling back to SSL or
@@ -3626,8 +3612,8 @@ keep_going: /* We will come back to here until there is
* response might mean that we are connecting to a
* pre-v12 server.
*/
- conn->status = CONNECTION_AWAITING_RESPONSE;
- goto keep_going;
+ libpq_append_conn_error(conn, "server sent an error response during GSS encryption exchange");
+ CONNECTION_FAILED();
}
/* mark byte consumed */