]> git.ipfire.org Git - thirdparty/postgresql.git/commit
Fix heap-buffer-overflow in pglz_decompress() on corrupt input.
authorAndrew Dunstan <andrew@dunslane.net>
Thu, 9 Apr 2026 15:48:55 +0000 (11:48 -0400)
committerAndrew Dunstan <andrew@dunslane.net>
Fri, 10 Apr 2026 11:13:08 +0000 (07:13 -0400)
commit2b5ba2a0a141f621f61cb732d776dc78269f879b
tree318eeff563aaaa2c20444774b2be15c10e033755
parent2478bd5db0aad3599802636201af7adc170ba280
Fix heap-buffer-overflow in pglz_decompress() on corrupt input.

When decoding a match tag, pglz_decompress() reads 2 bytes (or 3
for extended-length matches) from the source buffer before checking
whether enough data remains.  The existing bounds check (sp > srcend)
occurs after the reads, so truncated compressed data that ends
mid-tag causes a read past the allocated buffer.

Fix by validating that sufficient source bytes are available before
reading each part of the match tag.  The post-read sp > srcend
check is no longer needed and is removed.

Found by fuzz testing with libFuzzer and AddressSanitizer.
src/common/pg_lzcompress.c