Re: A worst case for qsort

Поиск
Список
Период
Сортировка
От John Cochran
Тема Re: A worst case for qsort
Дата
Msg-id CAGQU3n7ZPPLN9C2pcXrp9UoOOFMm-Y4g0jFAVufCHEX8-L3-Zg@mail.gmail.com
обсуждение исходный текст
Ответ на Re: A worst case for qsort  (Fabien COELHO <coelho@cri.ensmp.fr>)
Ответы Re: A worst case for qsort
Список pgsql-hackers
I just browsed the paper linked by Peter and it looks like the attack has to be active against a currently executing qsort. In the paper, what happens is the comparison function is supplied by the attacker and effectively lies about the result of a comparison. It keeps the lies consistent in a very specific manner so that eventually qsort returns its input in a properly sorted fashion.

So it seems to me that the vulnerability only exits if an attacker supplied comparison function is permitted. For all other cases, assuming that only vetted comparison functions are permitted, the selection of a random pivot would make an attack on qsort using specially tailored input data improbable.




В списке pgsql-hackers по дате отправления:

Предыдущее
От: Bill Epstein
Дата:
Сообщение: Questions on dynamic execution and sqlca
Следующее
От: Stephen Frost
Дата:
Сообщение: Re: Questions on dynamic execution and sqlca