~ubuntu-branches/ubuntu/oneiric/postgresql-9.1/oneiric-security

« back to all changes in this revision

Viewing changes to src/backend/access/gin/ginfast.c

  • Committer: Package Import Robot
  • Author(s): Martin Pitt
  • Date: 2013-02-05 18:13:52 UTC
  • mfrom: (1.1.10) (10.1.5 oneiric-proposed)
  • Revision ID: package-import@ubuntu.com-20130205181352-3kw4f94ilqklzm7c
Tags: 9.1.8-0ubuntu11.10
* New upstream security/bug fix release: (LP: #1116336)
  - Prevent execution of enum_recv from SQL
    The function was misdeclared, allowing a simple SQL command to crash the
    server.  In principle an attacker might be able to use it to examine the
    contents of server memory.  Our thanks to Sumit Soni (via Secunia SVCRP)
    for reporting this issue. (CVE-2013-0255)
  - See HISTORY/changelog.gz for the other bug fixes.

Show diffs side-by-side

added added

removed removed

Lines of Context:
291
291
                if (metadata->head == InvalidBlockNumber)
292
292
                {
293
293
                        /*
294
 
                         * Main list is empty, so just copy sublist into main list
 
294
                         * Main list is empty, so just insert sublist as main list
295
295
                         */
296
296
                        START_CRIT_SECTION();
297
297
 
314
314
                        LockBuffer(buffer, GIN_EXCLUSIVE);
315
315
                        page = BufferGetPage(buffer);
316
316
 
 
317
                        rdata[0].next = rdata + 1;
 
318
 
 
319
                        rdata[1].buffer = buffer;
 
320
                        rdata[1].buffer_std = true;
 
321
                        rdata[1].data = NULL;
 
322
                        rdata[1].len = 0;
 
323
                        rdata[1].next = NULL;
 
324
 
317
325
                        Assert(GinPageGetOpaque(page)->rightlink == InvalidBlockNumber);
318
326
 
319
327
                        START_CRIT_SECTION();