aboutsummaryrefslogtreecommitdiff
path: root/src/backend/regex/regexec.c
diff options
context:
space:
mode:
authorNoah Misch <noah@leadboat.com>2014-02-17 09:33:31 -0500
committerNoah Misch <noah@leadboat.com>2014-02-17 09:33:39 -0500
commitd0ed1a6c044452a529c1d544647ea1fcb90dcb81 (patch)
tree7589b94c4d52d508035b3674c3b770933f6f9cbe /src/backend/regex/regexec.c
parente464761333024d2c63f6b1d04af4ea7ca317003b (diff)
downloadpostgresql-d0ed1a6c044452a529c1d544647ea1fcb90dcb81.tar.gz
postgresql-d0ed1a6c044452a529c1d544647ea1fcb90dcb81.zip
Fix handling of wide datetime input/output.
Many server functions use the MAXDATELEN constant to size a buffer for parsing or displaying a datetime value. It was much too small for the longest possible interval output and slightly too small for certain valid timestamp input, particularly input with a long timezone name. The long input was rejected needlessly; the long output caused interval_out() to overrun its buffer. ECPG's pgtypes library has a copy of the vulnerable functions, which bore the same vulnerabilities along with some of its own. In contrast to the server, certain long inputs caused stack overflow rather than failing cleanly. Back-patch to 8.4 (all supported versions). Reported by Daniel Schüssler, reviewed by Tom Lane. Security: CVE-2014-0063
Diffstat (limited to 'src/backend/regex/regexec.c')
0 files changed, 0 insertions, 0 deletions