From dafd0382cb075526a54b18f0f27bd9916d52a113 Mon Sep 17 00:00:00 2001 From: Qingqing Li Date: Thu, 24 Jul 2025 09:13:13 +0800 Subject: [PATCH] posix: Fix double-free after allocation failure in regcomp (bug 33185 CVE-2025-8058) (cherry picked from commit 91b6a841007c2d1f772c0e7e38b8dfcc2825ca34) --- glibc.spec | 6 +- ...-free-after-allocation-failure-in-re.patch | 238 ++++++++++++++++++ 2 files changed, 243 insertions(+), 1 deletion(-) create mode 100644 posix-Fix-double-free-after-allocation-failure-in-re.patch diff --git a/glibc.spec b/glibc.spec index a5d6c9a..b86e09b 100644 --- a/glibc.spec +++ b/glibc.spec @@ -67,7 +67,7 @@ ############################################################################## Name: glibc Version: 2.38 -Release: 65 +Release: 66 Summary: The GNU libc libraries License: %{all_license} URL: http://www.gnu.org/software/glibc/ @@ -307,6 +307,7 @@ Patch217: nptl-PTHREAD_COND_INITIALIZER-compatibility-with-pre.patch Patch218: malloc-add-indirection-for-malloc-like-functions-in-.patch Patch219: malloc-obscure-calloc-use-in-tst-calloc.patch Patch220: malloc-cleanup-casts-in-tst-calloc.patch +Patch221: posix-Fix-double-free-after-allocation-failure-in-re.patch #openEuler patch list Patch9000: turn-default-value-of-x86_rep_stosb_threshold_form_2K_to_1M.patch @@ -1535,6 +1536,9 @@ fi %endif %changelog +* Wed Jul 30 2025 Qingqing Li - 2.38-66 +- posix: Fix double-free after allocation failure in regcomp (bug 33185 CVE-2025-8058) + * Tue Jul 29 2025 andy - 2.38-65 - elf: Fix UB on _dl_map_object_from_fd - elf: Fix handling of symbol versions which hash to zero diff --git a/posix-Fix-double-free-after-allocation-failure-in-re.patch b/posix-Fix-double-free-after-allocation-failure-in-re.patch new file mode 100644 index 0000000..4770bc2 --- /dev/null +++ b/posix-Fix-double-free-after-allocation-failure-in-re.patch @@ -0,0 +1,238 @@ +From 7ea06e994093fa0bcca0d0ee2c1db271d8d7885d Mon Sep 17 00:00:00 2001 +From: Florian Weimer +Date: Mon, 21 Jul 2025 21:43:49 +0200 +Subject: [PATCH] posix: Fix double-free after allocation failure in regcomp + (bug 33185) + +If a memory allocation failure occurs during bracket expression +parsing in regcomp, a double-free error may result. + +Reported-by: Anastasia Belova +Co-authored-by: Paul Eggert +Reviewed-by: Andreas K. Huettel +--- + posix/Makefile | 1 + + posix/regcomp.c | 4 +- + posix/tst-regcomp-bracket-free.c | 176 +++++++++++++++++++++++++++++++ + 3 files changed, 180 insertions(+), 1 deletion(-) + create mode 100644 posix/tst-regcomp-bracket-free.c + +diff --git a/posix/Makefile b/posix/Makefile +index 36b8b14c46..a36e5decd3 100644 +--- a/posix/Makefile ++++ b/posix/Makefile +@@ -304,6 +304,7 @@ tests := \ + tst-posix_spawn-setsid \ + tst-preadwrite \ + tst-preadwrite64 \ ++ tst-regcomp-bracket-free \ + tst-regcomp-truncated \ + tst-regex \ + tst-regex2 \ +diff --git a/posix/regcomp.c b/posix/regcomp.c +index 32043e9d37..f7278bb852 100644 +--- a/posix/regcomp.c ++++ b/posix/regcomp.c +@@ -3387,6 +3387,7 @@ parse_bracket_exp (re_string_t *regexp, re_dfa_t *dfa, re_token_t *token, + { + #ifdef RE_ENABLE_I18N + free_charset (mbcset); ++ mbcset = NULL; + #endif + /* Build a tree for simple bracket. */ + br_token.type = SIMPLE_BRACKET; +@@ -3402,7 +3403,8 @@ parse_bracket_exp (re_string_t *regexp, re_dfa_t *dfa, re_token_t *token, + parse_bracket_exp_free_return: + re_free (sbcset); + #ifdef RE_ENABLE_I18N +- free_charset (mbcset); ++ if (__glibc_likely (mbcset != NULL)) ++ free_charset (mbcset); + #endif /* RE_ENABLE_I18N */ + return NULL; + } +diff --git a/posix/tst-regcomp-bracket-free.c b/posix/tst-regcomp-bracket-free.c +new file mode 100644 +index 0000000000..3c091d8c44 +--- /dev/null ++++ b/posix/tst-regcomp-bracket-free.c +@@ -0,0 +1,176 @@ ++/* Test regcomp bracket parsing with injected allocation failures (bug 33185). ++ Copyright (C) 2025 Free Software Foundation, Inc. ++ This file is part of the GNU C Library. ++ ++ The GNU C Library is free software; you can redistribute it and/or ++ modify it under the terms of the GNU Lesser General Public ++ License as published by the Free Software Foundation; either ++ version 2.1 of the License, or (at your option) any later version. ++ ++ The GNU C Library is distributed in the hope that it will be useful, ++ but WITHOUT ANY WARRANTY; without even the implied warranty of ++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU ++ Lesser General Public License for more details. ++ ++ You should have received a copy of the GNU Lesser General Public ++ License along with the GNU C Library; if not, see ++ . */ ++ ++/* This test invokes regcomp multiple times, failing one memory ++ allocation in each call. The function call should fail with ++ REG_ESPACE (or succeed if it can recover from the allocation ++ failure). Previously, there was double-free bug. */ ++ ++#include ++#include ++#include ++#include ++#include ++#include ++#include ++ ++/* Data structure allocated via MAP_SHARED, so that writes from the ++ subprocess are visible. */ ++struct shared_data ++{ ++ /* Number of tracked allocations performed so far. */ ++ volatile unsigned int allocation_count; ++ ++ /* If this number is reached, one allocation fails. */ ++ volatile unsigned int failing_allocation; ++ ++ /* The subprocess stores the expected name here. */ ++ char name[100]; ++}; ++ ++/* Allocation count in shared mapping. */ ++static struct shared_data *shared; ++ ++/* Returns true if a failure should be injected for this allocation. */ ++static bool ++fail_this_allocation (void) ++{ ++ if (shared != NULL) ++ { ++ unsigned int count = shared->allocation_count; ++ shared->allocation_count = count + 1; ++ return count == shared->failing_allocation; ++ } ++ else ++ return false; ++} ++ ++/* Failure-injecting wrappers for allocation functions used by glibc. */ ++ ++void * ++malloc (size_t size) ++{ ++ if (fail_this_allocation ()) ++ { ++ errno = ENOMEM; ++ return NULL; ++ } ++ extern __typeof (malloc) __libc_malloc; ++ return __libc_malloc (size); ++} ++ ++void * ++calloc (size_t a, size_t b) ++{ ++ if (fail_this_allocation ()) ++ { ++ errno = ENOMEM; ++ return NULL; ++ } ++ extern __typeof (calloc) __libc_calloc; ++ return __libc_calloc (a, b); ++} ++ ++void * ++realloc (void *ptr, size_t size) ++{ ++ if (fail_this_allocation ()) ++ { ++ errno = ENOMEM; ++ return NULL; ++ } ++ extern __typeof (realloc) __libc_realloc; ++ return __libc_realloc (ptr, size); ++} ++ ++/* No-op subprocess to verify that support_isolate_in_subprocess does ++ not perform any heap allocations. */ ++static void ++no_op (void *ignored) ++{ ++} ++ ++/* Perform a regcomp call in a subprocess. Used to count its ++ allocations. */ ++static void ++initialize (void *regexp1) ++{ ++ const char *regexp = regexp1; ++ ++ shared->allocation_count = 0; ++ ++ regex_t reg; ++ TEST_COMPARE (regcomp (®, regexp, 0), 0); ++} ++ ++/* Perform regcomp in a subprocess with fault injection. */ ++static void ++test_in_subprocess (void *regexp1) ++{ ++ const char *regexp = regexp1; ++ unsigned int inject_at = shared->failing_allocation; ++ ++ regex_t reg; ++ int ret = regcomp (®, regexp, 0); ++ ++ if (ret != 0) ++ { ++ TEST_COMPARE (ret, REG_ESPACE); ++ printf ("info: allocation %u failure results in return value %d," ++ " error %s (%d)\n", ++ inject_at, ret, strerrorname_np (errno), errno); ++ } ++} ++ ++static int ++do_test (void) ++{ ++ char regexp[] = "[:alpha:]"; ++ ++ shared = support_shared_allocate (sizeof (*shared)); ++ ++ /* Disable fault injection. */ ++ shared->failing_allocation = ~0U; ++ ++ support_isolate_in_subprocess (no_op, NULL); ++ TEST_COMPARE (shared->allocation_count, 0); ++ ++ support_isolate_in_subprocess (initialize, regexp); ++ ++ /* The number of allocations in the successful case, plus some ++ slack. Once the number of expected allocations is exceeded, ++ injecting further failures does not make a difference. */ ++ unsigned int maximum_allocation_count = shared->allocation_count; ++ printf ("info: successful call performs %u allocations\n", ++ maximum_allocation_count); ++ maximum_allocation_count += 10; ++ ++ for (unsigned int inject_at = 0; inject_at <= maximum_allocation_count; ++ ++inject_at) ++ { ++ shared->allocation_count = 0; ++ shared->failing_allocation = inject_at; ++ support_isolate_in_subprocess (test_in_subprocess, regexp); ++ } ++ ++ support_shared_free (shared); ++ ++ return 0; ++} ++ ++#include +-- +2.27.0 + -- Gitee