]> granicus.if.org Git - postgresql/commit
Fix buffer overflow when processing SCRAM final message in libpq
authorMichael Paquier <michael@paquier.xyz>
Mon, 17 Jun 2019 13:14:04 +0000 (22:14 +0900)
committerMichael Paquier <michael@paquier.xyz>
Mon, 17 Jun 2019 13:14:04 +0000 (22:14 +0900)
commit27c464e42a9e3cb3779d1ea63b835a3e191682d6
tree08286534e7eb331b7e2f09abc7ce048cb62303a3
parent4c779ce324a15ffa0171160c52579130f25fcd3f
Fix buffer overflow when processing SCRAM final message in libpq

When a client connects to a rogue server sending specifically-crafted
messages, this can suffice to execute arbitrary code as the operating
system account used by the client.

While on it, fix one error handling when decoding an incorrect salt
included in the first message received from server.

Author: Michael Paquier
Reviewed-by: Jonathan Katz, Heikki Linnakangas
Security: CVE-2019-10164
Backpatch-through: 10
src/interfaces/libpq/fe-auth-scram.c