Ubuntu: 1058-1: PostgreSQL vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: 1058-1: PostgreSQL vulnerability
# 1  
Old 02-04-2011
Ubuntu: 1058-1: PostgreSQL vulnerability

LinuxSecurity.com: Geoff Keating reported that a buffer overflow exists in the intarraymodule's input function for the query_int type. This could allow anattacker to cause a denial of service or possibly execute arbitrarycode as the postgres user. [More...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Ubuntu

istalling postgresql driver on ubuntu

Hello everybody i am working on ubuntu 9.4 and i want to connect from erlang program to postgresql database i download the driver for postgresql from Open Source Projects from Erlang Training and Consultng Ltd. then i try to setup this driver using make install and it didn't work, So can... (4 Replies)
Discussion started by: Reham$
4 Replies
Login or Register to Ask a Question
PG_UNESCAPE_BYTEA(3)													      PG_UNESCAPE_BYTEA(3)

pg_unescape_bytea - Unescape binary for bytea type

SYNOPSIS
string pg_unescape_bytea (string $data) DESCRIPTION
pg_unescape_bytea(3) unescapes PostgreSQL bytea data values. It returns the unescaped string, possibly containing binary data. Note When you SELECT a bytea type, PostgreSQL returns octal byte values prefixed with '' (e.g. 32). Users are supposed to convert back to binary format manually. This function requires PostgreSQL 7.2 or later. With PostgreSQL 7.2.0 and 7.2.1, bytea values must be cast when you enable multi- byte support. i.e. INSERT INTO test_table (image) VALUES ('$image_escaped'::bytea); PostgreSQL 7.2.2 or later does not need a cast. The exception is when the client and backend character encoding does not match, and there may be multi-byte stream error. User must then cast to bytea to avoid this error. PARAMETERS
o $data - A string containing PostgreSQL bytea data to be converted into a PHP binary string. RETURN VALUES
A string containing the unescaped data. EXAMPLES
Example #1 pg_unescape_bytea(3) example <?php // Connect to the database $dbconn = pg_connect('dbname=foo'); // Get the bytea data $res = pg_query("SELECT data FROM gallery WHERE name='Pine trees'"); $raw = pg_fetch_result($res, 'data'); // Convert to binary and send to the browser header('Content-type: image/jpeg'); echo pg_unescape_bytea($raw); ?> CHANGELOG
+--------+---------------------------------------------------+ |Version | | | | | | | Description | | | | +--------+---------------------------------------------------+ | 5.5.1 | | | | | | | A warning is thrown if the input string is | | | invalid. | | | | +--------+---------------------------------------------------+ SEE ALSO
pg_escape_bytea(3), pg_escape_string(3). PHP Documentation Group PG_UNESCAPE_BYTEA(3)