to_char(): prevent accesses beyond the allocated buffer
Previously very long field masks for floats could access memory beyond the existing buffer allocated to hold the result. Reported by Andres Freund and Peter Geoghegan. Backpatch to all supported versions. Security: CVE-2015-0241
This commit is contained in:
parent
5828f7c668
commit
611e110aab
@ -4187,7 +4187,9 @@ NUM_numpart_to_char(NUMProc *Np, int id)
|
||||
Np->num_in = TRUE;
|
||||
}
|
||||
}
|
||||
++Np->number_p;
|
||||
/* do no exceed string length */
|
||||
if (*Np->number_p)
|
||||
++Np->number_p;
|
||||
}
|
||||
|
||||
end = Np->num_count + (Np->out_pre_spaces ? 1 : 0) + (IS_DECIMAL(Np->Num) ? 1 : 0);
|
||||
|
Loading…
x
Reference in New Issue
Block a user