[PATCH] contrib/xml2: guard against signed integer overflow in parse_params

Started by Varik Matevosyanabout 3 hours ago2 messageshackers
Jump to latest
#1Varik Matevosyan
varikmatevosyan@gmail.com

Hi,

Small robustness fix for contrib/xml2/parse_params. The doubling
of max_params relies on signed-integer overflow wrapping to a value
that AllocSizeIsValid then rejects, which is both UB and incidental
safety.

The overflow is unreachable in current builds (text input is bounded
by MaxAllocSize, which limits nparams below the doubling threshold),
but the fix is small and matches the explicit overflow-checking
idiom used elsewhere in the tree.

Patch attached against current master.

Regards,
Varik

Attachments:

0001-contrib-xml2-guard-against-signed-integer-overflow-i.patchapplication/octet-stream; name=0001-contrib-xml2-guard-against-signed-integer-overflow-i.patchDownload+8-2
#2Tom Lane
tgl@sss.pgh.pa.us
In reply to: Varik Matevosyan (#1)
Re: [PATCH] contrib/xml2: guard against signed integer overflow in parse_params

Varik Matevosyan <varikmatevosyan@gmail.com> writes:

Small robustness fix for contrib/xml2/parse_params. The doubling
of max_params relies on signed-integer overflow wrapping to a value
that AllocSizeIsValid then rejects, which is both UB and incidental
safety.

There are many many places in our tree that handle that the same way.
The argument that it's UB is nonsense, because AllocSizeIsValid
rejects values >= 1G, so that it will fail on the iteration before
the integer counter can overflow. (This is indeed exactly why that
limit is 1G and not 2G; see the comment for MaxAllocSize.)

I think this proposal makes parse_params less like other code,
not more so, so I don't think we need extra code here.

regards, tom lane