postgresql/contrib/pgcrypto/expected/pgp-info.out
Noah Misch 1dc7551586 Fix buffer overrun after incomplete read in pullf_read_max().
Most callers pass a stack buffer.  The ensuing stack smash can crash the
server, and we have not ruled out the viability of attacks that lead to
privilege escalation.  Back-patch to 9.0 (all supported versions).

Marko Tiikkaja

Security: CVE-2015-0243
2015-02-02 10:00:45 -05:00

80 lines
1.7 KiB
Plaintext

--
-- PGP info functions
--
-- pgp_key_id
select pgp_key_id(dearmor(pubkey)) from keytbl where id=1;
pgp_key_id
------------------
D936CF64BB73F466
(1 row)
select pgp_key_id(dearmor(pubkey)) from keytbl where id=2;
pgp_key_id
------------------
2C226E1FFE5CC7D4
(1 row)
select pgp_key_id(dearmor(pubkey)) from keytbl where id=3;
pgp_key_id
------------------
B68504FD128E1FF9
(1 row)
select pgp_key_id(dearmor(pubkey)) from keytbl where id=4; -- should fail
ERROR: No encryption key found
select pgp_key_id(dearmor(pubkey)) from keytbl where id=5;
pgp_key_id
------------------
D936CF64BB73F466
(1 row)
select pgp_key_id(dearmor(pubkey)) from keytbl where id=6;
pgp_key_id
------------------
FD0206C409B74875
(1 row)
select pgp_key_id(dearmor(seckey)) from keytbl where id=1;
pgp_key_id
------------------
D936CF64BB73F466
(1 row)
select pgp_key_id(dearmor(seckey)) from keytbl where id=2;
pgp_key_id
------------------
2C226E1FFE5CC7D4
(1 row)
select pgp_key_id(dearmor(seckey)) from keytbl where id=3;
pgp_key_id
------------------
B68504FD128E1FF9
(1 row)
select pgp_key_id(dearmor(seckey)) from keytbl where id=4; -- should fail
ERROR: No encryption key found
select pgp_key_id(dearmor(seckey)) from keytbl where id=5;
pgp_key_id
------------------
D936CF64BB73F466
(1 row)
select pgp_key_id(dearmor(seckey)) from keytbl where id=6;
pgp_key_id
------------------
FD0206C409B74875
(1 row)
select pgp_key_id(dearmor(data)) as data_key_id
from encdata order by id;
data_key_id
------------------
D936CF64BB73F466
2C226E1FFE5CC7D4
B68504FD128E1FF9
FD0206C409B74875
FD0206C409B74875
(5 rows)