robocop
4778d95532
Possible buffer overrun.
2004-10-07 09:02:24 +00:00
robocop
40aeec1962
Possible buffer overrun (SOLARIS & VMS)
...
strncpy does not guarantee to write the null terminator!
2004-10-07 09:01:39 +00:00
robocop
fd044f5851
Misc
2004-10-07 08:43:53 +00:00
robocop
7581e18254
Little simplification.
2004-10-07 08:33:51 +00:00
skidder
2ce8ec6f11
Report lock manager error code to the user when pessimistic lock conflict is encountered. This change fixes a problem with deadlock reporting for pessimistic locks so it should be backported to B1_5_Release
2004-10-07 06:15:09 +00:00
arnobrinkman
0209cf6c1f
bugfix on previous commit
2004-10-06 11:44:03 +00:00
arnobrinkman
36f0cc2527
fix problem with duplicate keys and wrong second recordnumber order in IDX_create_index
2004-10-05 21:09:51 +00:00
dimitr
275673fcf1
Fixed possible resource leaks for procedured subqueries.
2004-10-05 20:16:29 +00:00
paul_reeves
20097b332b
increment build number
2004-10-05 10:56:56 +00:00
paul_reeves
c65492d8d3
increment build number
2004-10-05 10:56:55 +00:00
paul_reeves
5b17ee1126
increment build number
2004-10-05 10:56:47 +00:00
hvlad
684a23096b
increment build number
2004-10-05 07:03:46 +00:00
fsg
16a86758e6
increment build number
2004-10-05 01:09:06 +00:00
fsg
8ad5588f4c
increment build number
2004-10-05 01:08:17 +00:00
alexpeshkoff
1809423469
increment build number
2004-10-04 16:55:16 +00:00
robocop
39547d4b1b
increment build number
2004-10-04 08:47:51 +00:00
robocop
c23b1ec33f
increment build number
2004-10-04 08:37:54 +00:00
robocop
d6f9a7874a
Close vulnerability #6 in gds__interprete's new version.
...
In the loop, if several parameter exist, they are copied one after another in the same dynamic buffer. Therefore, for the 2nd param and more, we don't have the full buffer size to copy arguments, but only the remainder. Big buffer overflow could happen here.
If there's no buffer at all (from fix #5 ), the empty literal string is passed.
Now, fb_interpret seems ready to be used.
2004-10-04 08:37:49 +00:00
robocop
1999c4b699
increment build number
2004-10-04 08:15:02 +00:00
robocop
ed17cfafbf
Style:
...
if<space>(
for<space>(
switch<space>(
while<space>(
2004-10-04 08:15:00 +00:00
robocop
af7009beab
increment build number
2004-10-04 08:14:56 +00:00
robocop
cc4b4519b4
increment build number
2004-10-04 08:14:48 +00:00
robocop
9ae6ff9817
increment build number
2004-10-04 08:14:43 +00:00
robocop
d563607b99
increment build number
2004-10-04 08:14:39 +00:00
robocop
111568b907
increment build number
2004-10-04 08:07:36 +00:00
robocop
4964a1c7a1
Close vulnerability #5 in gds__interprete's new version, reported by Dmitry Sibiryakov.
...
When copying paramters to a dynamic buffer, the null terminator was written beyond the buffer's end.
Additionally, if there's no buffer at all (to be evident when fix #6 is posted), the empty literal string is passed.
2004-10-04 08:07:28 +00:00
robocop
43c46a29cd
Close vulnerability #4 in gds__interprete's new version.
...
Static array with 10 places to hold pointers to parameters (isc_arg_string, isc_arg_number & isc_arg_cstring) may overflow in the loop that fills it and doesn't check bounds.
2004-10-04 07:38:28 +00:00
skidder
5ad0284800
increment build number
2004-10-04 05:23:59 +00:00
skidder
abf5277660
increment build number
2004-10-04 05:23:58 +00:00
robocop
77a26b2156
increment build number
2004-10-04 04:59:45 +00:00
robocop
e5ad0f1a7f
Misc cleanup.
2004-10-04 04:59:43 +00:00
robocop
0535156358
increment build number
2004-10-04 04:59:42 +00:00
robocop
b231d30b4e
increment build number
2004-10-04 04:45:06 +00:00
robocop
c3fb316461
increment build number
2004-10-04 04:44:53 +00:00
robocop
bdf5dea379
Close vulnerability #3 in gds__interprete's new version.
...
Traditional sprintf could write past the end of buffer.
2004-10-04 04:44:52 +00:00
robocop
b4704b7bf4
increment build number
2004-10-04 04:43:44 +00:00
robocop
54b61b6cd5
Totally misc: typo in comment.
2004-10-04 04:43:42 +00:00
robocop
a13558c917
increment build number
2004-10-04 04:42:58 +00:00
robocop
0a7c7d1860
Fix problem created by Blas' cleanup (went unnoticed at its due time).
...
sizeof(literal string) != sizeof(pointer to literal string)
Possible buffer overrun in one place.
2004-10-04 04:42:56 +00:00
robocop
c25fa7a153
increment build number
2004-10-04 04:39:59 +00:00
robocop
9b112424fa
Months ago I marked a buffer overrun in deliver_request().
...
Now I think I've fixed it.
2004-10-04 04:39:55 +00:00
asfernandes
5631d1fa70
increment build number
2004-10-04 02:00:02 +00:00
asfernandes
a15eaca9a8
increment build number
2004-10-04 01:59:58 +00:00
asfernandes
df29eee21d
increment build number
2004-10-03 23:05:31 +00:00
asfernandes
5c6760616c
increment build number
2004-10-03 23:05:05 +00:00
asfernandes
ae724176ea
increment build number
2004-10-03 23:05:01 +00:00
asfernandes
0ae648f26e
increment build number
2004-10-03 23:05:00 +00:00
asfernandes
be9ca9c237
increment build number
2004-10-03 23:04:53 +00:00
asfernandes
12cc466cef
increment build number
2004-10-03 23:04:39 +00:00
asfernandes
4eee6189a2
increment build number
2004-10-03 23:03:49 +00:00