> 2 нояб. 2020 г., в 04:45, Tom Lane <tgl@sss.pgh.pa.us> написал(а):
>
>> PG Bug reporting form <noreply@postgresql.org> writes:
>>> This looks to me like a low level issue with Postgres13 and TOAST objects of
>>> a specific size and or compression behavior.
>
> After looking at it some more, I'm pretty sure that these issues could
> explain your problem, though it's possible there's an additional
> contributing issue. If you're in a position to apply a patch and
> see whether it fixes the problem, please try
>
> https://git.postgresql.org/gitweb/?p=postgresql.git;a=patch;h=2330f4d3a87ac43b6ecd31bfd698384888ed03cb
Thanks for fixing this, Tom!
1 or 2 extra bytes of match header at the end of sequence of literals is a bug for sure. And the input sequence does
notneed to be small.
I'm not sure protection from corrupt input is complete within pglz. We still do not protect from matches with offsets
beforesource data. This can SegFault or lead to security leaks. I suspect there may be other go-wild input sequences.
Thanks! Best regards, Andrey Borodin.