diff options
| author | Robert Haas | 2015-01-15 14:26:03 +0000 |
|---|---|---|
| committer | Robert Haas | 2015-01-15 14:29:55 +0000 |
| commit | ebbef4f3959501f65041739759ea6c5b34437091 (patch) | |
| tree | e6e0c2f29eb22d6a0ce9514218a689ef6ce25242 | |
| parent | cc7a3a45a8d861caa0807af7280277d38f9bf85a (diff) | |
pg_standby: Avoid writing one byte beyond the end of the buffer.
Previously, read() might have returned a length equal to the buffer
length, and then the subsequent store to buf[len] would write a
zero-byte one byte past the end. This doesn't seem likely to be
a security issue, but there's some chance it could result in
pg_standby misbehaving.
Spotted by Coverity; patch by Michael Paquier, reviewed by me.
| -rw-r--r-- | contrib/pg_standby/pg_standby.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/contrib/pg_standby/pg_standby.c b/contrib/pg_standby/pg_standby.c index 87255b9ee83..59b71dedcb7 100644 --- a/contrib/pg_standby/pg_standby.c +++ b/contrib/pg_standby/pg_standby.c @@ -435,7 +435,7 @@ CheckForExternalTrigger(void) return; } - if ((len = read(fd, buf, sizeof(buf))) < 0) + if ((len = read(fd, buf, sizeof(buf) - 1)) < 0) { fprintf(stderr, "WARNING: could not read \"%s\": %s\n", triggerPath, strerror(errno)); |
