Skip to content

Commit 611e110

Browse files
committed
to_char(): prevent accesses beyond the allocated buffer
Previously very long field masks for floats could access memory beyond the existing buffer allocated to hold the result. Reported by Andres Freund and Peter Geoghegan. Backpatch to all supported versions. Security: CVE-2015-0241
1 parent 5828f7c commit 611e110

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

src/backend/utils/adt/formatting.c

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4187,7 +4187,9 @@ NUM_numpart_to_char(NUMProc *Np, int id)
41874187
Np->num_in = TRUE;
41884188
}
41894189
}
4190-
++Np->number_p;
4190+
/* do no exceed string length */
4191+
if (*Np->number_p)
4192+
++Np->number_p;
41914193
}
41924194

41934195
end = Np->num_count + (Np->out_pre_spaces ? 1 : 0) + (IS_DECIMAL(Np->Num) ? 1 : 0);

0 commit comments

Comments
 (0)