pgsql: Fix possible buffer overrun and/or unportable behavior in

Поиск
Список
Период
Сортировка
От tgl@postgresql.org (Tom Lane)
Тема pgsql: Fix possible buffer overrun and/or unportable behavior in
Дата
Msg-id 20090915023115.A9D98753FBC@cvs.postgresql.org
обсуждение исходный текст
Список pgsql-committers
Log Message:
-----------
Fix possible buffer overrun and/or unportable behavior in pg_md5_encrypt()
if salt_len == 0.  This seems to be mostly academic, since nearly all calling
code paths guarantee nonempty salt; the only case that doesn't is
PQencryptPassword where the caller could mistakenly pass an empty username.
So, fix it but don't bother backpatching.  Per ljb.

Modified Files:
--------------
    pgsql/src/backend/libpq:
        md5.c (r1.36 -> r1.37)
        (http://anoncvs.postgresql.org/cvsweb.cgi/pgsql/src/backend/libpq/md5.c?r1=1.36&r2=1.37)

В списке pgsql-committers по дате отправления:

Предыдущее
От: petere@postgresql.org (Peter Eisentraut)
Дата:
Сообщение: pgsql: Print builds don't actually depend on html target (anymore).
Следующее
От: meskes@postgresql.org (Michael Meskes)
Дата:
Сообщение: pgsql: Applied patch by Boszormenyi Zoltan to add