Make palloc_array() and friends safe against integer overflow.

Sufficiently large "count" arguments could result in undetected
overflow, causing the allocated memory chunk to be much smaller
than what the caller will subsequently write into it.  This is
unlikely to be a hazard with 64-bit size_t but can sometimes
happen on 32-bit builds, primarily where a function allocates
workspace that's significantly larger than its input data.
Rather than trying to patch the at-risk callers piecemeal,
let's just redefine these macros so that they always check.

To do that, move the longstanding add_size() and mul_size() functions
into palloc.h and mcxt.c, and adjust them to not be specific to
shared-memory allocation.  Then invent palloc_mul(), palloc0_mul(),
palloc_mul_extended() to use these functions.  Actually, the latter
use inlined copies to save one function call.  repalloc_array() gets
similar treatment.  I didn't bother trying to inline the calls for
repalloc0_array() though.

In v14 and v15, this also adds repalloc_extended(), which previously
was only available in v16 and up.

We need copies of all this in fe_memutils.[hc] as well, since that
module also provides palloc_array() etc.

Reported-by: Xint Code
Author: Tom Lane <[email protected]>
Reviewed-by: Masahiko Sawada <[email protected]>
Backpatch-through: 14
Security: CVE-2026-6473

Branch
------
REL_17_STABLE

Details
-------
https://git.postgresql.org/pg/commitdiff/fe2720c450655a9986dd731a62e476ea3e1313b0
Author: Tom Lane <[email protected]>

Modified Files
--------------
src/backend/storage/ipc/shmem.c  |  36 --------
src/backend/utils/mmgr/mcxt.c    | 129 +++++++++++++++++++++++++++
src/common/fe_memutils.c         | 188 +++++++++++++++++++++++++++++++++++++++
src/include/common/fe_memutils.h |  28 ++++--
src/include/storage/shmem.h      |   2 -
src/include/utils/memutils.h     |   2 +-
src/include/utils/palloc.h       |  22 ++++-
7 files changed, 358 insertions(+), 49 deletions(-)

Reply via email to