Skip to content

Commit

Permalink
Fix possible buffer overrun in contrib/pg_trgm.
Browse files Browse the repository at this point in the history
Allow for the possibility that folding a string to lower case makes it
longer (due to replacing a character with a longer multibyte character).
This doesn't change the number of trigrams that will be extracted, but
it does affect the required size of an intermediate buffer in
generate_trgm().  Per bug #8821 from Ufuk Kayserilioglu.

Also install some checks that the input string length is not so large
as to cause overflow in the calculations of palloc request sizes.

Back-patch to all supported versions.
  • Loading branch information
tglsfdc committed Jan 13, 2014
1 parent 866a1f0 commit c3ccc9e
Showing 1 changed file with 35 additions and 3 deletions.
38 changes: 35 additions & 3 deletions contrib/pg_trgm/trgm_op.c
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@

#include "catalog/pg_type.h"
#include "tsearch/ts_locale.h"
#include "utils/memutils.h"


PG_MODULE_MAGIC;
Expand Down Expand Up @@ -188,6 +189,18 @@ generate_trgm(char *str, int slen)
char *bword,
*eword;

/*
* Guard against possible overflow in the palloc requests below. (We
* don't worry about the additive constants, since palloc can detect
* requests that are a little above MaxAllocSize --- we just need to
* prevent integer overflow in the multiplications.)
*/
if ((Size) (slen / 2) >= (MaxAllocSize / (sizeof(trgm) * 3)) ||
(Size) slen >= (MaxAllocSize / pg_database_encoding_max_length()))
ereport(ERROR,
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
errmsg("out of memory")));

trg = (TRGM *) palloc(TRGMHDRSIZE + sizeof(trgm) * (slen / 2 + 1) *3);
trg->flag = ARRKEY;
SET_VARSIZE(trg, TRGMHDRSIZE);
Expand All @@ -197,7 +210,8 @@ generate_trgm(char *str, int slen)

tptr = GETARR(trg);

buf = palloc(sizeof(char) * (slen + 4));
/* Allocate a buffer for case-folded, blank-padded words */
buf = (char *) palloc(slen * pg_database_encoding_max_length() + 4);

if (LPADDING > 0)
{
Expand All @@ -221,6 +235,7 @@ generate_trgm(char *str, int slen)
#ifdef IGNORECASE
pfree(bword);
#endif

buf[LPADDING + bytelen] = ' ';
buf[LPADDING + bytelen + 1] = ' ';

Expand All @@ -236,7 +251,10 @@ generate_trgm(char *str, int slen)
if ((len = tptr - GETARR(trg)) == 0)
return trg;

if (len > 0)
/*
* Make trigrams unique.
*/
if (len > 1)
{
qsort((void *) GETARR(trg), len, sizeof(trgm), comp_trgm);
len = unique_array(GETARR(trg), len);
Expand Down Expand Up @@ -419,6 +437,18 @@ generate_wildcard_trgm(const char *str, int slen)
bytelen;
const char *eword;

/*
* Guard against possible overflow in the palloc requests below. (We
* don't worry about the additive constants, since palloc can detect
* requests that are a little above MaxAllocSize --- we just need to
* prevent integer overflow in the multiplications.)
*/
if ((Size) (slen / 2) >= (MaxAllocSize / (sizeof(trgm) * 3)) ||
(Size) slen >= (MaxAllocSize / pg_database_encoding_max_length()))
ereport(ERROR,
(errcode(ERRCODE_PROGRAM_LIMIT_EXCEEDED),
errmsg("out of memory")));

trg = (TRGM *) palloc(TRGMHDRSIZE + sizeof(trgm) * (slen / 2 + 1) *3);
trg->flag = ARRKEY;
SET_VARSIZE(trg, TRGMHDRSIZE);
Expand All @@ -428,6 +458,7 @@ generate_wildcard_trgm(const char *str, int slen)

tptr = GETARR(trg);

/* Allocate a buffer for blank-padded, but not yet case-folded, words */
buf = palloc(sizeof(char) * (slen + 4));

/*
Expand All @@ -448,6 +479,7 @@ generate_wildcard_trgm(const char *str, int slen)
* count trigrams
*/
tptr = make_trigrams(tptr, buf2, bytelen, charlen);

#ifdef IGNORECASE
pfree(buf2);
#endif
Expand All @@ -461,7 +493,7 @@ generate_wildcard_trgm(const char *str, int slen)
/*
* Make trigrams unique.
*/
if (len > 0)
if (len > 1)
{
qsort((void *) GETARR(trg), len, sizeof(trgm), comp_trgm);
len = unique_array(GETARR(trg), len);
Expand Down

0 comments on commit c3ccc9e

Please sign in to comment.