a2bd8e17dc
CVE-2011-0216 - Off-by-one error CVE-2011-2821 - Double free vulnerability CVE-2011-2834 - Double free vulnerability CVE-2011-3905 - DOS (out-of-bounds read) via unspecified vectors CVE-2011-3919 - Heap-based buffer overflow ok sthen@
322 lines
11 KiB
Plaintext
322 lines
11 KiB
Plaintext
$OpenBSD: patch-xpath_c,v 1.4 2012/01/23 10:17:49 ajacoutot Exp $
|
|
|
|
From f5048b3e71fc30ad096970b8df6e7af073bae4cb Mon Sep 17 00:00:00 2001
|
|
From: Daniel Veillard <veillard@redhat.com>
|
|
Date: Thu, 18 Aug 2011 09:10:13 +0000
|
|
Subject: Hardening of XPath evaluation
|
|
|
|
- Fix for CVE-2010-4494, Libxml2 XPath Double Free Vulnerability.
|
|
From upstream git: df83c17e5a2646bd923f75e5e507bc80d73c9722
|
|
|
|
- Fix for SA44711, Libxml2 XPath Nodeset Processing Vulnerability.
|
|
From upstream git: d7958b21e7f8c447a26bb2436f08402b2c308be4
|
|
|
|
- Fix for CVE-2011-2821, Libxml2 XSLT Double Free Vulnerabilitiy.
|
|
From upstream git: df83c17e5a2646bd923f75e5e507bc80d73c9722
|
|
|
|
- Fix for CVE-2011-2834, Libxml2 XSLT Double Free Vulnerabilitiy.
|
|
From upstream git: 1d4526f6f4ec8d18c40e2a09b387652a6c1aa2cd
|
|
|
|
--- xpath.c.orig Mon Jan 23 08:15:36 2012
|
|
+++ xpath.c Mon Jan 23 08:20:48 2012
|
|
@@ -252,6 +252,7 @@ static const char *xmlXPathErrorMessages[] = {
|
|
"Encoding error\n",
|
|
"Char out of XML range\n",
|
|
"Invalid or incomplete context\n",
|
|
+ "Stack usage errror\n",
|
|
"?? Unknown error ??\n" /* Must be last in the list! */
|
|
};
|
|
#define MAXERRNO ((int)(sizeof(xmlXPathErrorMessages) / \
|
|
@@ -2398,6 +2399,42 @@ xmlXPathCacheConvertNumber(xmlXPathContextPtr ctxt, xm
|
|
************************************************************************/
|
|
|
|
/**
|
|
+ * xmlXPathSetFrame:
|
|
+ * @ctxt: an XPath parser context
|
|
+ *
|
|
+ * Set the callee evaluation frame
|
|
+ *
|
|
+ * Returns the previous frame value to be restored once done
|
|
+ */
|
|
+static int
|
|
+xmlXPathSetFrame(xmlXPathParserContextPtr ctxt) {
|
|
+ int ret;
|
|
+
|
|
+ if (ctxt == NULL)
|
|
+ return(0);
|
|
+ ret = ctxt->valueFrame;
|
|
+ ctxt->valueFrame = ctxt->valueNr;
|
|
+ return(ret);
|
|
+}
|
|
+
|
|
+/**
|
|
+ * xmlXPathPopFrame:
|
|
+ * @ctxt: an XPath parser context
|
|
+ * @frame: the previous frame value
|
|
+ *
|
|
+ * Remove the callee evaluation frame
|
|
+ */
|
|
+static void
|
|
+xmlXPathPopFrame(xmlXPathParserContextPtr ctxt, int frame) {
|
|
+ if (ctxt == NULL)
|
|
+ return;
|
|
+ if (ctxt->valueNr < ctxt->valueFrame) {
|
|
+ xmlXPatherror(ctxt, __FILE__, __LINE__, XPATH_STACK_ERROR);
|
|
+ }
|
|
+ ctxt->valueFrame = frame;
|
|
+}
|
|
+
|
|
+/**
|
|
* valuePop:
|
|
* @ctxt: an XPath evaluation context
|
|
*
|
|
@@ -2412,6 +2449,12 @@ valuePop(xmlXPathParserContextPtr ctxt)
|
|
|
|
if ((ctxt == NULL) || (ctxt->valueNr <= 0))
|
|
return (NULL);
|
|
+
|
|
+ if (ctxt->valueNr <= ctxt->valueFrame) {
|
|
+ xmlXPatherror(ctxt, __FILE__, __LINE__, XPATH_STACK_ERROR);
|
|
+ return (NULL);
|
|
+ }
|
|
+
|
|
ctxt->valueNr--;
|
|
if (ctxt->valueNr > 0)
|
|
ctxt->value = ctxt->valueTab[ctxt->valueNr - 1];
|
|
@@ -2442,6 +2485,7 @@ valuePush(xmlXPathParserContextPtr ctxt, xmlXPathObjec
|
|
sizeof(ctxt->valueTab[0]));
|
|
if (tmp == NULL) {
|
|
xmlGenericError(xmlGenericErrorContext, "realloc failed !\n");
|
|
+ ctxt->error = XPATH_MEMORY_ERROR;
|
|
return (0);
|
|
}
|
|
ctxt->valueMax *= 2;
|
|
@@ -3522,13 +3566,13 @@ xmlXPathNodeSetAddNs(xmlNodeSetPtr cur, xmlNodePtr nod
|
|
} else if (cur->nodeNr == cur->nodeMax) {
|
|
xmlNodePtr *temp;
|
|
|
|
- cur->nodeMax *= 2;
|
|
- temp = (xmlNodePtr *) xmlRealloc(cur->nodeTab, cur->nodeMax *
|
|
+ temp = (xmlNodePtr *) xmlRealloc(cur->nodeTab, cur->nodeMax * 2 *
|
|
sizeof(xmlNodePtr));
|
|
if (temp == NULL) {
|
|
xmlXPathErrMemory(NULL, "growing nodeset\n");
|
|
return;
|
|
}
|
|
+ cur->nodeMax *= 2;
|
|
cur->nodeTab = temp;
|
|
}
|
|
cur->nodeTab[cur->nodeNr++] = xmlXPathNodeSetDupNs(node, ns);
|
|
@@ -3627,14 +3671,14 @@ xmlXPathNodeSetAddUnique(xmlNodeSetPtr cur, xmlNodePtr
|
|
} else if (cur->nodeNr == cur->nodeMax) {
|
|
xmlNodePtr *temp;
|
|
|
|
- cur->nodeMax *= 2;
|
|
- temp = (xmlNodePtr *) xmlRealloc(cur->nodeTab, cur->nodeMax *
|
|
+ temp = (xmlNodePtr *) xmlRealloc(cur->nodeTab, cur->nodeMax * 2 *
|
|
sizeof(xmlNodePtr));
|
|
if (temp == NULL) {
|
|
xmlXPathErrMemory(NULL, "growing nodeset\n");
|
|
return;
|
|
}
|
|
cur->nodeTab = temp;
|
|
+ cur->nodeMax *= 2;
|
|
}
|
|
if (val->type == XML_NAMESPACE_DECL) {
|
|
xmlNsPtr ns = (xmlNsPtr) val;
|
|
@@ -3738,14 +3782,14 @@ xmlXPathNodeSetMerge(xmlNodeSetPtr val1, xmlNodeSetPtr
|
|
} else if (val1->nodeNr == val1->nodeMax) {
|
|
xmlNodePtr *temp;
|
|
|
|
- val1->nodeMax *= 2;
|
|
- temp = (xmlNodePtr *) xmlRealloc(val1->nodeTab, val1->nodeMax *
|
|
+ temp = (xmlNodePtr *) xmlRealloc(val1->nodeTab, val1->nodeMax * 2 *
|
|
sizeof(xmlNodePtr));
|
|
if (temp == NULL) {
|
|
xmlXPathErrMemory(NULL, "merging nodeset\n");
|
|
return(NULL);
|
|
}
|
|
val1->nodeTab = temp;
|
|
+ val1->nodeMax *= 2;
|
|
}
|
|
if (n2->type == XML_NAMESPACE_DECL) {
|
|
xmlNsPtr ns = (xmlNsPtr) n2;
|
|
@@ -3907,14 +3951,14 @@ xmlXPathNodeSetMergeAndClear(xmlNodeSetPtr set1, xmlNo
|
|
} else if (set1->nodeNr >= set1->nodeMax) {
|
|
xmlNodePtr *temp;
|
|
|
|
- set1->nodeMax *= 2;
|
|
temp = (xmlNodePtr *) xmlRealloc(
|
|
- set1->nodeTab, set1->nodeMax * sizeof(xmlNodePtr));
|
|
+ set1->nodeTab, set1->nodeMax * 2 * sizeof(xmlNodePtr));
|
|
if (temp == NULL) {
|
|
xmlXPathErrMemory(NULL, "merging nodeset\n");
|
|
return(NULL);
|
|
}
|
|
set1->nodeTab = temp;
|
|
+ set1->nodeMax *= 2;
|
|
}
|
|
if (n2->type == XML_NAMESPACE_DECL) {
|
|
xmlNsPtr ns = (xmlNsPtr) n2;
|
|
@@ -3991,14 +4035,14 @@ xmlXPathNodeSetMergeAndClearNoDupls(xmlNodeSetPtr set1
|
|
} else if (set1->nodeNr >= set1->nodeMax) {
|
|
xmlNodePtr *temp;
|
|
|
|
- set1->nodeMax *= 2;
|
|
temp = (xmlNodePtr *) xmlRealloc(
|
|
- set1->nodeTab, set1->nodeMax * sizeof(xmlNodePtr));
|
|
+ set1->nodeTab, set1->nodeMax * 2 * sizeof(xmlNodePtr));
|
|
if (temp == NULL) {
|
|
xmlXPathErrMemory(NULL, "merging nodeset\n");
|
|
return(NULL);
|
|
}
|
|
set1->nodeTab = temp;
|
|
+ set1->nodeMax *= 2;
|
|
}
|
|
set1->nodeTab[set1->nodeNr++] = n2;
|
|
}
|
|
@@ -6154,6 +6198,7 @@ xmlXPathCompParserContext(xmlXPathCompExprPtr comp, xm
|
|
ret->valueNr = 0;
|
|
ret->valueMax = 10;
|
|
ret->value = NULL;
|
|
+ ret->valueFrame = 0;
|
|
|
|
ret->context = ctxt;
|
|
ret->comp = comp;
|
|
@@ -9296,6 +9341,7 @@ xmlXPathTranslateFunction(xmlXPathParserContextPtr ctx
|
|
if ( (ch & 0xc0) != 0xc0 ) {
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathTranslateFunction: Invalid UTF8 string\n");
|
|
+ /* not asserting an XPath error is probably better */
|
|
break;
|
|
}
|
|
/* then skip over remaining bytes for this char */
|
|
@@ -9303,6 +9349,7 @@ xmlXPathTranslateFunction(xmlXPathParserContextPtr ctx
|
|
if ( (*cptr++ & 0xc0) != 0x80 ) {
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathTranslateFunction: Invalid UTF8 string\n");
|
|
+ /* not asserting an XPath error is probably better */
|
|
break;
|
|
}
|
|
if (ch & 0x80) /* must have had error encountered */
|
|
@@ -11712,6 +11759,7 @@ xmlXPathCompOpEvalPositionalPredicate(xmlXPathParserCo
|
|
xmlXPathObjectPtr contextObj = NULL, exprRes = NULL;
|
|
xmlNodePtr oldContextNode, contextNode = NULL;
|
|
xmlXPathContextPtr xpctxt = ctxt->context;
|
|
+ int frame;
|
|
|
|
#ifdef LIBXML_XPTR_ENABLED
|
|
/*
|
|
@@ -11731,6 +11779,8 @@ xmlXPathCompOpEvalPositionalPredicate(xmlXPathParserCo
|
|
*/
|
|
exprOp = &ctxt->comp->steps[op->ch2];
|
|
for (i = 0; i < set->nodeNr; i++) {
|
|
+ xmlXPathObjectPtr tmp;
|
|
+
|
|
if (set->nodeTab[i] == NULL)
|
|
continue;
|
|
|
|
@@ -11758,18 +11808,25 @@ xmlXPathCompOpEvalPositionalPredicate(xmlXPathParserCo
|
|
xmlXPathNodeSetAddUnique(contextObj->nodesetval,
|
|
contextNode);
|
|
|
|
+ frame = xmlXPathSetFrame(ctxt);
|
|
valuePush(ctxt, contextObj);
|
|
res = xmlXPathCompOpEvalToBoolean(ctxt, exprOp, 1);
|
|
+ tmp = valuePop(ctxt);
|
|
+ xmlXPathPopFrame(ctxt, frame);
|
|
|
|
if ((ctxt->error != XPATH_EXPRESSION_OK) || (res == -1)) {
|
|
- xmlXPathObjectPtr tmp;
|
|
- /* pop the result */
|
|
- tmp = valuePop(ctxt);
|
|
- xmlXPathReleaseObject(xpctxt, tmp);
|
|
- /* then pop off contextObj, which will be freed later */
|
|
- valuePop(ctxt);
|
|
+ while (tmp != contextObj) {
|
|
+ /*
|
|
+ * Free up the result
|
|
+ * then pop off contextObj, which will be freed later
|
|
+ */
|
|
+ xmlXPathReleaseObject(xpctxt, tmp);
|
|
+ tmp = valuePop(ctxt);
|
|
+ }
|
|
goto evaluation_error;
|
|
}
|
|
+ /* push the result back onto the stack */
|
|
+ valuePush(ctxt, tmp);
|
|
|
|
if (res)
|
|
pos++;
|
|
@@ -13357,6 +13414,7 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathCompOpEval: variable %s bound to undefined prefix %s\n",
|
|
(char *) op->value4, (char *)op->value5);
|
|
+ ctxt->error = XPATH_UNDEF_PREFIX_ERROR;
|
|
return (total);
|
|
}
|
|
val = xmlXPathVariableLookupNS(ctxt->context,
|
|
@@ -13373,7 +13431,9 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
xmlXPathFunction func;
|
|
const xmlChar *oldFunc, *oldFuncURI;
|
|
int i;
|
|
+ int frame;
|
|
|
|
+ frame = xmlXPathSetFrame(ctxt);
|
|
if (op->ch1 != -1)
|
|
total +=
|
|
xmlXPathCompOpEval(ctxt, &comp->steps[op->ch1]);
|
|
@@ -13381,15 +13441,18 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathCompOpEval: parameter error\n");
|
|
ctxt->error = XPATH_INVALID_OPERAND;
|
|
+ xmlXPathPopFrame(ctxt, frame);
|
|
return (total);
|
|
}
|
|
- for (i = 0; i < op->value; i++)
|
|
+ for (i = 0; i < op->value; i++) {
|
|
if (ctxt->valueTab[(ctxt->valueNr - 1) - i] == NULL) {
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathCompOpEval: parameter error\n");
|
|
ctxt->error = XPATH_INVALID_OPERAND;
|
|
+ xmlXPathPopFrame(ctxt, frame);
|
|
return (total);
|
|
}
|
|
+ }
|
|
if (op->cache != NULL)
|
|
XML_CAST_FPTR(func) = op->cache;
|
|
else {
|
|
@@ -13405,6 +13468,8 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"xmlXPathCompOpEval: function %s bound to undefined prefix %s\n",
|
|
(char *)op->value4, (char *)op->value5);
|
|
+ ctxt->error = XPATH_UNDEF_PREFIX_ERROR;
|
|
+ xmlXPathPopFrame(ctxt, frame);
|
|
return (total);
|
|
}
|
|
func = xmlXPathFunctionLookupNS(ctxt->context,
|
|
@@ -13426,6 +13491,7 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
func(ctxt, op->value);
|
|
ctxt->context->function = oldFunc;
|
|
ctxt->context->functionURI = oldFuncURI;
|
|
+ xmlXPathPopFrame(ctxt, frame);
|
|
return (total);
|
|
}
|
|
case XPATH_OP_ARG:
|
|
@@ -13982,6 +14048,7 @@ xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlX
|
|
}
|
|
xmlGenericError(xmlGenericErrorContext,
|
|
"XPath: unknown precompiled operation %d\n", op->op);
|
|
+ ctxt->error = XPATH_INVALID_OPERAND;
|
|
return (total);
|
|
}
|
|
|
|
@@ -14329,6 +14396,7 @@ xmlXPathRunEval(xmlXPathParserContextPtr ctxt, int toB
|
|
ctxt->valueNr = 0;
|
|
ctxt->valueMax = 10;
|
|
ctxt->value = NULL;
|
|
+ ctxt->valueFrame = 0;
|
|
}
|
|
#ifdef XPATH_STREAMING
|
|
if (ctxt->comp->stream) {
|