Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in
| От | Tom Lane |
|---|---|
| Тема | Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in |
| Дата | |
| Msg-id | 6772.1029857312@sss.pgh.pa.us обсуждение исходный текст |
| Ответ на | Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in ("Nigel J. Andrews" <nandrews@investsystems.co.uk>) |
| Ответы |
Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in
Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in |
| Список | pgsql-hackers |
"Nigel J. Andrews" <nandrews@investsystems.co.uk> writes:
> But going back to the idea that it seems that the only problem being
> publicised in the 'outside world' is the cash_out(2) version can we
> not do the restriction on acceptable input type in order to claim that
> the fix?
Totally pointless IMHO, when the same problem exists in hundreds of
other functions. Also, there really is no way to patch cash_out per se;
the problem is a system-level problem, namely failure to enforce type
checking. cash_out has no way to know that what it's been passed is the
wrong kind of datum.
Basically, we've used "opaque" as a substitute for accurate type
declarations; that's got to stop.
regards, tom lane
В списке pgsql-hackers по дате отправления: