summaryrefslogtreecommitdiff
path: root/doc/src/sgml/client-auth.sgml
diff options
context:
space:
mode:
authorJacob Champion2025-11-10 14:02:34 +0000
committerJacob Champion2025-11-10 14:20:33 +0000
commit600086f471a3bb57ff4953accf1d3f8d2efe0201 (patch)
treec164307cfe8e45486fc613d5147ccf73404ce618 /doc/src/sgml/client-auth.sgml
parent3e0ae46d907dd5f36342dd288841f4502bd571f6 (diff)
libpq: Prevent some overflows of int/size_tHEADmaster
Several functions could overflow their size calculations, when presented with very large inputs from remote and/or untrusted locations, and then allocate buffers that were too small to hold the intended contents. Switch from int to size_t where appropriate, and check for overflow conditions when the inputs could have plausibly originated outside of the libpq trust boundary. (Overflows from within the trust boundary are still possible, but these will be fixed separately.) A version of add_size() is ported from the backend to assist with code that performs more complicated concatenation. Reported-by: Aleksey Solovev (Positive Technologies) Reviewed-by: Noah Misch <[email protected]> Reviewed-by: Álvaro Herrera <[email protected]> Security: CVE-2025-12818 Backpatch-through: 13
Diffstat (limited to 'doc/src/sgml/client-auth.sgml')
0 files changed, 0 insertions, 0 deletions