postgresql/contrib/pg_trgm/data
Thomas Munro c67bef3f32 Code coverage for most pg_mblen* calls.
A security patch changed them today, so close the coverage gap now.
Test that buffer overrun is avoided when pg_mblen*() requires more
than the number of bytes remaining.

This does not cover the calls in dict_thesaurus.c or in dict_synonym.c.
That code is straightforward.  To change that code's input, one must
have access to modify installed OS files, so low-privilege users are not
a threat.  Testing this would likewise require changing installed
share/postgresql/tsearch_data, which was enough of an obstacle to not
bother.

Security: CVE-2026-2006
Backpatch-through: 14
Co-authored-by: Thomas Munro <thomas.munro@gmail.com>
Co-authored-by: Noah Misch <noah@leadboat.com>
Reviewed-by: Heikki Linnakangas <hlinnaka@iki.fi>
2026-02-09 12:44:12 +13:00
..
trgm.data trgm - Trigram matching for PostgreSQL 2004-05-31 17:18:12 +00:00
trgm2.data Add files forgotten in f576b17cd6 2016-03-16 19:23:41 +03:00
trgm_utf8.data Code coverage for most pg_mblen* calls. 2026-02-09 12:44:12 +13:00