diff options
| author | Tom Lane <tgl@sss.pgh.pa.us> | 2011-01-27 17:41:51 -0500 |
|---|---|---|
| committer | Tom Lane <tgl@sss.pgh.pa.us> | 2011-01-27 17:43:22 -0500 |
| commit | d1fd7b290c82867d6abe945551546d398741a4b3 (patch) | |
| tree | a3b8cd50c9a79d0af51267288931131c569722d9 /src/interfaces/ecpg/include/ecpg_informix.h | |
| parent | 8bbb60225a8127681718f399af9b8d90170c435f (diff) | |
Prevent buffer overrun while parsing an integer in a "query_int" value.
contrib/intarray's gettoken() uses a fixed-size buffer to collect an
integer's digits, and did not guard against overrunning the buffer.
This is at least a backend crash risk, and in principle might allow
arbitrary code execution. The code didn't check for overflow of the
integer value either, which while not presenting a crash risk was still
bad.
Thanks to Apple Inc's security team for reporting this issue and supplying
the fix.
Security: CVE-2010-4015
Diffstat (limited to 'src/interfaces/ecpg/include/ecpg_informix.h')
0 files changed, 0 insertions, 0 deletions
