diff options
author | Tom Lane <tgl@sss.pgh.pa.us> | 2011-01-27 17:42:00 -0500 |
---|---|---|
committer | Tom Lane <tgl@sss.pgh.pa.us> | 2011-01-27 17:43:45 -0500 |
commit | e11349fdbae7295b91699a70a791c093fc6d254e (patch) | |
tree | d9f7ead229ec7cd2f0915396af1733ca907f2057 /src/backend/utils/adt/arrayfuncs.c | |
parent | 948a64d2b9d75e20a247fd7e3f11fd2a4120319b (diff) | |
download | postgresql-e11349fdbae7295b91699a70a791c093fc6d254e.tar.gz postgresql-e11349fdbae7295b91699a70a791c093fc6d254e.zip |
Prevent buffer overrun while parsing an integer in a "query_int" value.
contrib/intarray's gettoken() uses a fixed-size buffer to collect an
integer's digits, and did not guard against overrunning the buffer.
This is at least a backend crash risk, and in principle might allow
arbitrary code execution. The code didn't check for overflow of the
integer value either, which while not presenting a crash risk was still
bad.
Thanks to Apple Inc's security team for reporting this issue and supplying
the fix.
Security: CVE-2010-4015
Diffstat (limited to 'src/backend/utils/adt/arrayfuncs.c')
0 files changed, 0 insertions, 0 deletions