]> git.ipfire.org Git - thirdparty/postgresql.git/commit
Fix buffer overflow when processing SCRAM final message in libpq
authorMichael Paquier <michael@paquier.xyz>
Mon, 17 Jun 2019 13:14:09 +0000 (22:14 +0900)
committerMichael Paquier <michael@paquier.xyz>
Mon, 17 Jun 2019 13:14:09 +0000 (22:14 +0900)
commitd72a7e4da1001b29a661a4b1a52cb5c4d708bab0
treefd5a404feb3ac02dd144fefa84445b6f7920594c
parent90adc16ea13750a6b6f704c6cf65dc0f1bdb845c
Fix buffer overflow when processing SCRAM final message in libpq

When a client connects to a rogue server sending specifically-crafted
messages, this can suffice to execute arbitrary code as the operating
system account used by the client.

While on it, fix one error handling when decoding an incorrect salt
included in the first message received from server.

Author: Michael Paquier
Reviewed-by: Jonathan Katz, Heikki Linnakangas
Security: CVE-2019-10164
Backpatch-through: 10
src/interfaces/libpq/fe-auth-scram.c