From: | Ranier Vilela <ranier(dot)vf(at)gmail(dot)com> |
---|---|
To: | Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> |
Cc: | PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org> |
Subject: | Re: CID 1428952 (#1 of 1): Out-of-bounds access (OVERRUN) (src/backend/commands/async.c) |
Date: | 2020-07-18 19:27:36 |
Message-ID: | CAEudQApF8g6ELjyMiMXD_OS6ey4P-QX8VQcmE11ypWOgboE82A@mail.gmail.com |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-hackers |
Em sáb., 18 de jul. de 2020 às 15:19, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us> escreveu:
> Ranier Vilela <ranier(dot)vf(at)gmail(dot)com> writes:
> > Em sáb., 18 de jul. de 2020 às 14:21, Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
> escreveu:
> >> No, there's just something wrong with Coverity's analysis.
> >> I've grown a bit disillusioned with that tool; of late it's
> >> been giving many more false positives than useful reports.
>
> > It could be, differences in the sizes of the types. Since on Linux, there
> > may be no alerts.
>
> No, all the types involved here should be pretty platform-independent.
> IIRC, the PG security team already saw this same warning from Coverity,
> and we dismissed it as a false positive.
>
Understood, again, thanks for your time.
regards,
Ranier Vilela
From | Date | Subject | |
---|---|---|---|
Next Message | Justin Pryzby | 2020-07-18 20:15:32 | Re: pg_ls_tmpdir to show directories and shared filesets (and pg_ls_*) |
Previous Message | Tom Lane | 2020-07-18 18:59:18 | Re: Busted includes somewhere near worker_internal.h |