hvlad
684a23096b
increment build number
2004-10-05 07:03:46 +00:00
hvlad
4591207542
Correct on-stack constructor for SparseBitmap (discussed with Nickolay)
2004-10-05 07:03:26 +00:00
fsg
16a86758e6
increment build number
2004-10-05 01:09:06 +00:00
fsg
8ad5588f4c
increment build number
2004-10-05 01:08:17 +00:00
fsg
a5b7967f60
nightly update
2004-10-05 01:08:11 +00:00
alexpeshkoff
1809423469
increment build number
2004-10-04 16:55:16 +00:00
robocop
39547d4b1b
increment build number
2004-10-04 08:47:51 +00:00
robocop
a80a37cd1b
Make fbudf more civilized:
...
- Functions that use an output argument shouldn't return anything.
- Signal null output blob if the engine understands it.
- Make input parameter const except in some cases where the library plays with input params using internal engine knowledge (not recommended for general usage).
2004-10-04 08:47:41 +00:00
robocop
c23b1ec33f
increment build number
2004-10-04 08:37:54 +00:00
robocop
d6f9a7874a
Close vulnerability #6 in gds__interprete's new version.
...
In the loop, if several parameter exist, they are copied one after another in the same dynamic buffer. Therefore, for the 2nd param and more, we don't have the full buffer size to copy arguments, but only the remainder. Big buffer overflow could happen here.
If there's no buffer at all (from fix #5 ), the empty literal string is passed.
Now, fb_interpret seems ready to be used.
2004-10-04 08:37:49 +00:00
robocop
1999c4b699
increment build number
2004-10-04 08:15:02 +00:00
robocop
ed17cfafbf
Style:
...
if<space>(
for<space>(
switch<space>(
while<space>(
2004-10-04 08:15:00 +00:00
robocop
af7009beab
increment build number
2004-10-04 08:14:56 +00:00
robocop
e9c4099501
increment build number
2004-10-04 08:14:55 +00:00
robocop
cc4b4519b4
increment build number
2004-10-04 08:14:48 +00:00
robocop
9ae6ff9817
increment build number
2004-10-04 08:14:43 +00:00
robocop
d563607b99
increment build number
2004-10-04 08:14:39 +00:00
robocop
111568b907
increment build number
2004-10-04 08:07:36 +00:00
robocop
4964a1c7a1
Close vulnerability #5 in gds__interprete's new version, reported by Dmitry Sibiryakov.
...
When copying paramters to a dynamic buffer, the null terminator was written beyond the buffer's end.
Additionally, if there's no buffer at all (to be evident when fix #6 is posted), the empty literal string is passed.
2004-10-04 08:07:28 +00:00
robocop
6d9cd4c7c3
increment build number
2004-10-04 07:38:33 +00:00
robocop
43c46a29cd
Close vulnerability #4 in gds__interprete's new version.
...
Static array with 10 places to hold pointers to parameters (isc_arg_string, isc_arg_number & isc_arg_cstring) may overflow in the loop that fills it and doesn't check bounds.
2004-10-04 07:38:28 +00:00
skidder
5ad0284800
increment build number
2004-10-04 05:23:59 +00:00
skidder
abf5277660
increment build number
2004-10-04 05:23:58 +00:00
skidder
6c85fc2f27
Use GNU autoconf macros to determine switches required to generate threaded binaries properly
2004-10-04 05:23:56 +00:00
robocop
f1b30f408b
increment build number
2004-10-04 04:59:46 +00:00
robocop
77a26b2156
increment build number
2004-10-04 04:59:45 +00:00
robocop
e5ad0f1a7f
Misc cleanup.
2004-10-04 04:59:43 +00:00
robocop
0535156358
increment build number
2004-10-04 04:59:42 +00:00
robocop
da2a5c1abc
Finalize Nickolay's rollback of my changes to get MSVC6 compiling HEAD.
2004-10-04 04:59:05 +00:00
robocop
b231d30b4e
increment build number
2004-10-04 04:45:06 +00:00
robocop
c3fb316461
increment build number
2004-10-04 04:44:53 +00:00
robocop
bdf5dea379
Close vulnerability #3 in gds__interprete's new version.
...
Traditional sprintf could write past the end of buffer.
2004-10-04 04:44:52 +00:00
robocop
1f9ca2fb2f
increment build number
2004-10-04 04:43:45 +00:00
robocop
b4704b7bf4
increment build number
2004-10-04 04:43:44 +00:00
robocop
54b61b6cd5
Totally misc: typo in comment.
2004-10-04 04:43:42 +00:00
robocop
a13558c917
increment build number
2004-10-04 04:42:58 +00:00
robocop
0a7c7d1860
Fix problem created by Blas' cleanup (went unnoticed at its due time).
...
sizeof(literal string) != sizeof(pointer to literal string)
Possible buffer overrun in one place.
2004-10-04 04:42:56 +00:00
robocop
c25fa7a153
increment build number
2004-10-04 04:39:59 +00:00
robocop
9b112424fa
Months ago I marked a buffer overrun in deliver_request().
...
Now I think I've fixed it.
2004-10-04 04:39:55 +00:00
asfernandes
5631d1fa70
increment build number
2004-10-04 02:00:02 +00:00
asfernandes
a15eaca9a8
increment build number
2004-10-04 01:59:58 +00:00
fsg
bc597c6f70
increment build number
2004-10-04 01:08:54 +00:00
fsg
1fcc2cc2ec
nightly update
2004-10-04 01:08:35 +00:00
asfernandes
df29eee21d
increment build number
2004-10-03 23:05:31 +00:00
asfernandes
5c6760616c
increment build number
2004-10-03 23:05:05 +00:00
asfernandes
ae724176ea
increment build number
2004-10-03 23:05:01 +00:00
asfernandes
0ae648f26e
increment build number
2004-10-03 23:05:00 +00:00
asfernandes
be9ca9c237
increment build number
2004-10-03 23:04:53 +00:00
asfernandes
12cc466cef
increment build number
2004-10-03 23:04:39 +00:00
asfernandes
4d58ab2ee4
increment build number
2004-10-03 23:04:27 +00:00