aboutsummaryrefslogtreecommitdiff
path: root/src/backend/access/gist/gistproc.c
diff options
context:
space:
mode:
authorTom Lane <tgl@sss.pgh.pa.us>2011-01-27 17:41:51 -0500
committerTom Lane <tgl@sss.pgh.pa.us>2011-01-27 17:43:22 -0500
commitd1fd7b290c82867d6abe945551546d398741a4b3 (patch)
treea3b8cd50c9a79d0af51267288931131c569722d9 /src/backend/access/gist/gistproc.c
parent8bbb60225a8127681718f399af9b8d90170c435f (diff)
downloadpostgresql-d1fd7b290c82867d6abe945551546d398741a4b3.tar.gz
postgresql-d1fd7b290c82867d6abe945551546d398741a4b3.zip
Prevent buffer overrun while parsing an integer in a "query_int" value.
contrib/intarray's gettoken() uses a fixed-size buffer to collect an integer's digits, and did not guard against overrunning the buffer. This is at least a backend crash risk, and in principle might allow arbitrary code execution. The code didn't check for overflow of the integer value either, which while not presenting a crash risk was still bad. Thanks to Apple Inc's security team for reporting this issue and supplying the fix. Security: CVE-2010-4015
Diffstat (limited to 'src/backend/access/gist/gistproc.c')
0 files changed, 0 insertions, 0 deletions