From: | Neil Conway <neilc(at)samurai(dot)com> |
---|---|
To: | momjian(at)postgresql(dot)org (Bruce Momjian - CVS) |
Cc: | pgsql-committers(at)postgresql(dot)org |
Subject: | Re: pgsql-server/src/backend/utils/adt oracle_compat.c |
Date: | 2002-08-22 04:59:08 |
Message-ID: | 87r8gr4hgj.fsf@mailbox.samurai.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-committers |
momjian(at)postgresql(dot)org (Bruce Momjian - CVS) writes:
> Modified files:
> src/backend/utils/adt: oracle_compat.c
>
> Log message:
> repeat() fix:
>
> > Neil Conway <neilc(at)samurai(dot)com> writes:
> > > + /* Check for integer overflow */
> > > + if (tlen / slen != count)
> > > + elog(ERROR, "Requested buffer is too large.");
> >
> > What about slen == 0?
>
> Good point -- that wouldn't cause incorrect results or a security
> problem, but it would reject input that we should really accept.
>
> Revised patch is attached.
This is the wrong version of the patch -- please apply the updated
patch I sent to -hackers (which is the same one I sent to you via
private mal).
Also, this should be applied to REL7_2_STABLE as well, IMHO.
Cheers,
Neil
--
Neil Conway <neilc(at)samurai(dot)com> || PGP Key ID: DB3C29FC
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian - CVS | 2002-08-22 05:05:19 | pgsql-server/src/backend/utils/adt oracle_compat.c |
Previous Message | Bruce Momjian - CVS | 2002-08-22 04:56:45 | pgsql-server/doc/src/sgml func.sgml |