to_char(): prevent accesses beyond the allocated buffer
Previously very long field masks for floats could access memory beyond the existing buffer allocated to hold the result. Reported by Andres Freund and Peter Geoghegan. Backpatch to all supported versions. Security: CVE-2015-0241
This commit is contained in:
parent
e87dedc0c4
commit
1628a0bbfa
@ -4428,7 +4428,9 @@ NUM_numpart_to_char(NUMProc *Np, int id)
|
||||
Np->num_in = TRUE;
|
||||
}
|
||||
}
|
||||
++Np->number_p;
|
||||
/* do no exceed string length */
|
||||
if (*Np->number_p)
|
||||
++Np->number_p;
|
||||
}
|
||||
|
||||
end = Np->num_count + (Np->out_pre_spaces ? 1 : 0) + (IS_DECIMAL(Np->Num) ? 1 : 0);
|
||||
|
Loading…
x
Reference in New Issue
Block a user