Skip to content

Conversation

@Mrcopytuo
Copy link

Hi Development Team,

This PR addresses a potential buffer overflow in the lexer’s token parsing
logic. The computed token length was not checked against
DB_MAX_ELEMENT_SIZE - 1, which may lead to out-of-bounds writes when
handling overly long tokens.

This issue corresponds to the vulnerability described in CVE-2018-1000804.
The patch adds the necessary bounds check to ensure safe and
null-terminated token copying.

Please review at your convenience. Thank you!

… length never exceeds DB_MAX_ELEMENT_SIZE - 1 before copying into lexer->value. This prevents potential buffer overflows when parsing long strings or identifiers and guarantees that the token value is always null-terminated.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant