source@mandoc.bsd.lv
 help / color / mirror / Atom feed
* mandoc: Fix a buffer overrun in the roff(7) escape sequence parser that
@ 2022-06-01 23:20 schwarze
  0 siblings, 0 replies; only message in thread
From: schwarze @ 2022-06-01 23:20 UTC (permalink / raw)
  To: source

Log Message:
-----------
Fix a buffer overrun in the roff(7) escape sequence parser that could
be triggered by macro arguments ending in double backslashes, for 
example if people wrote .Sq "\\" instead of the correct .Sq "\e".

The bug was hard to find because it caused a segfault only very rarely,
according to my measurements with a probability of less than one permille.
I'm sorry that the first one to hit the bug was an arm64 release build
run by deraadt@.  Thanks to bluhm@ for providing access to an arm64
machine for debugging purposes.  In the end, the bug turned out to be
architecture-independent.

The reason for the bug was that i assumed an invariant that does not exist.
The function roff_parse_comment() is very careful to make sure that the
input buffer does not end in an escape character before passing it on, 
so i assumed this is still true when reaching roff_expand() immediately 
afterwards.  But roff_expand() can also be reached from roff_getarg(), 
in which case there *can* be a lone escape character at the end of the 
buffer in case copy mode processing found and converted a double 
backslash.

Fix this by handling a trailing escape character correctly in the 
function roff_escape().

The lesson here probably is to refrain from assuming an invariant
unless verifying that the invariant actually holds is reasonably
simple.  In some cases, in particular for invariants that are important
but not simple, it might also make sense to assert(3) rather than just 
assume the invariant.  An assertion failure is so much better than a
buffer overrun...

Modified Files:
--------------
    mandoc:
        roff_escape.c

Revision Data
-------------
Index: roff_escape.c
===================================================================
RCS file: /home/cvs/mandoc/mandoc/roff_escape.c,v
retrieving revision 1.5
retrieving revision 1.6
diff -Lroff_escape.c -Lroff_escape.c -u -p -r1.5 -r1.6
--- roff_escape.c
+++ roff_escape.c
@@ -124,6 +124,9 @@ roff_escape(const char *buf, const int l
 		rval = ESCAPE_IGNORE;
 		goto out;
 
+	case '\0':
+		iendarg = --iend;
+		/* FALLTHROUGH */
 	case '\\':
 	default:
 		iarg--;
--
 To unsubscribe send an email to source+unsubscribe@mandoc.bsd.lv


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-06-01 23:20 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-01 23:20 mandoc: Fix a buffer overrun in the roff(7) escape sequence parser that schwarze

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).