8
0
mirror of https://github.com/FirebirdSQL/firebird.git synced 2025-01-31 00:03:02 +01:00
Commit Graph

9368 Commits

Author SHA1 Message Date
robocop
a8da598248 Redundant casts. 2004-10-08 11:08:42 +00:00
hvlad
edf72a34f6 Fix memory leak when a query contains both GROUP BY and DISTINCT and result set is empty 2004-10-08 10:18:41 +00:00
robocop
336661d8a1 Style. 2004-10-08 08:13:22 +00:00
robocop
25f115b66e Closing several possible buffer overruns.
Alex is expected to overwrite my changes in isc_file.cpp.
2004-10-08 04:48:02 +00:00
robocop
5833e93321 VMS-related changes. Just in case. 2004-10-07 09:46:03 +00:00
robocop
a2b4041050 Treat literal strings as constants, please. 2004-10-07 09:42:03 +00:00
robocop
7b01a5d1c8 Ugh, a change that belong to another, still not posted "configuration" slipped in. Go back. 2004-10-07 09:24:26 +00:00
dimitr
421f259a4e 1) Locks related cleanup
2) Got rid of TRA_nowait + transaction waits related cleanup
3) Return isc_lock_timeout when it's necessary
TODO: Enhance SET TRANSACTION
2004-10-07 09:15:32 +00:00
robocop
4778d95532 Possible buffer overrun. 2004-10-07 09:02:24 +00:00
robocop
40aeec1962 Possible buffer overrun (SOLARIS & VMS)
strncpy does not guarantee to write the null terminator!
2004-10-07 09:01:39 +00:00
robocop
fd044f5851 Misc 2004-10-07 08:43:53 +00:00
robocop
7581e18254 Little simplification. 2004-10-07 08:33:51 +00:00
skidder
2ce8ec6f11 Report lock manager error code to the user when pessimistic lock conflict is encountered. This change fixes a problem with deadlock reporting for pessimistic locks so it should be backported to B1_5_Release 2004-10-07 06:15:09 +00:00
arnobrinkman
0209cf6c1f bugfix on previous commit 2004-10-06 11:44:03 +00:00
arnobrinkman
36f0cc2527 fix problem with duplicate keys and wrong second recordnumber order in IDX_create_index 2004-10-05 21:09:51 +00:00
dimitr
275673fcf1 Fixed possible resource leaks for procedured subqueries. 2004-10-05 20:16:29 +00:00
paul_reeves
20097b332b increment build number 2004-10-05 10:56:56 +00:00
paul_reeves
c65492d8d3 increment build number 2004-10-05 10:56:55 +00:00
paul_reeves
5b17ee1126 increment build number 2004-10-05 10:56:47 +00:00
hvlad
684a23096b increment build number 2004-10-05 07:03:46 +00:00
fsg
16a86758e6 increment build number 2004-10-05 01:09:06 +00:00
fsg
8ad5588f4c increment build number 2004-10-05 01:08:17 +00:00
alexpeshkoff
1809423469 increment build number 2004-10-04 16:55:16 +00:00
robocop
39547d4b1b increment build number 2004-10-04 08:47:51 +00:00
robocop
c23b1ec33f increment build number 2004-10-04 08:37:54 +00:00
robocop
d6f9a7874a Close vulnerability #6 in gds__interprete's new version.
In the loop, if several parameter exist, they are copied one after another in the same dynamic buffer. Therefore, for the 2nd param and more, we don't have the full buffer size to copy arguments, but only the remainder. Big buffer overflow could happen here.
If there's no buffer at all (from fix #5), the empty literal string is passed.
Now, fb_interpret seems ready to be used.
2004-10-04 08:37:49 +00:00
robocop
1999c4b699 increment build number 2004-10-04 08:15:02 +00:00
robocop
ed17cfafbf Style:
if<space>(
for<space>(
switch<space>(
while<space>(
2004-10-04 08:15:00 +00:00
robocop
af7009beab increment build number 2004-10-04 08:14:56 +00:00
robocop
cc4b4519b4 increment build number 2004-10-04 08:14:48 +00:00
robocop
9ae6ff9817 increment build number 2004-10-04 08:14:43 +00:00
robocop
d563607b99 increment build number 2004-10-04 08:14:39 +00:00
robocop
111568b907 increment build number 2004-10-04 08:07:36 +00:00
robocop
4964a1c7a1 Close vulnerability #5 in gds__interprete's new version, reported by Dmitry Sibiryakov.
When copying paramters to a dynamic buffer, the null terminator was written beyond the buffer's end.
Additionally, if there's no buffer at all (to be evident when fix #6 is posted), the empty literal string is passed.
2004-10-04 08:07:28 +00:00
robocop
43c46a29cd Close vulnerability #4 in gds__interprete's new version.
Static array with 10 places to hold pointers to parameters (isc_arg_string, isc_arg_number & isc_arg_cstring) may overflow in the loop that fills it and doesn't check bounds.
2004-10-04 07:38:28 +00:00
skidder
5ad0284800 increment build number 2004-10-04 05:23:59 +00:00
skidder
abf5277660 increment build number 2004-10-04 05:23:58 +00:00
robocop
77a26b2156 increment build number 2004-10-04 04:59:45 +00:00
robocop
e5ad0f1a7f Misc cleanup. 2004-10-04 04:59:43 +00:00
robocop
0535156358 increment build number 2004-10-04 04:59:42 +00:00
robocop
b231d30b4e increment build number 2004-10-04 04:45:06 +00:00
robocop
c3fb316461 increment build number 2004-10-04 04:44:53 +00:00
robocop
bdf5dea379 Close vulnerability #3 in gds__interprete's new version.
Traditional sprintf could write past the end of buffer.
2004-10-04 04:44:52 +00:00
robocop
b4704b7bf4 increment build number 2004-10-04 04:43:44 +00:00
robocop
54b61b6cd5 Totally misc: typo in comment. 2004-10-04 04:43:42 +00:00
robocop
a13558c917 increment build number 2004-10-04 04:42:58 +00:00
robocop
0a7c7d1860 Fix problem created by Blas' cleanup (went unnoticed at its due time).
sizeof(literal string) != sizeof(pointer to literal string)
Possible buffer overrun in one place.
2004-10-04 04:42:56 +00:00
robocop
c25fa7a153 increment build number 2004-10-04 04:39:59 +00:00
robocop
9b112424fa Months ago I marked a buffer overrun in deliver_request().
Now I think I've fixed it.
2004-10-04 04:39:55 +00:00
asfernandes
5631d1fa70 increment build number 2004-10-04 02:00:02 +00:00