From: Peter Eisentraut Date: Sat, 23 Nov 2013 12:25:37 +0000 (-0500) Subject: Avoid potential buffer overflow crash X-Git-Tag: REL9_1_11~18 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=e1f7173ea19ad8977311dc72fe50492fae5c078d;p=postgresql Avoid potential buffer overflow crash A pointer to a C string was treated as a pointer to a "name" datum and passed to SPI_execute_plan(). This pointer would then end up being passed through datumCopy(), which would try to copy the entire 64 bytes of name data, thus running past the end of the C string. Fix by converting the string to a proper name structure. Found by LLVM AddressSanitizer. --- diff --git a/src/backend/utils/adt/ruleutils.c b/src/backend/utils/adt/ruleutils.c index ebfac92ee5..bfebef89eb 100644 --- a/src/backend/utils/adt/ruleutils.c +++ b/src/backend/utils/adt/ruleutils.c @@ -454,7 +454,7 @@ pg_get_viewdef_worker(Oid viewoid, int prettyFlags) * Get the pg_rewrite tuple for the view's SELECT rule */ args[0] = ObjectIdGetDatum(viewoid); - args[1] = PointerGetDatum(ViewSelectRuleName); + args[1] = DirectFunctionCall1(namein, CStringGetDatum(ViewSelectRuleName)); nulls[0] = ' '; nulls[1] = ' '; spirc = SPI_execute_plan(plan_getviewrule, args, nulls, true, 2);