8
0
mirror of https://github.com/FirebirdSQL/firebird.git synced 2025-01-24 06:43:03 +01:00
Commit Graph

9360 Commits

Author SHA1 Message Date
robocop
4778d95532 Possible buffer overrun. 2004-10-07 09:02:24 +00:00
robocop
40aeec1962 Possible buffer overrun (SOLARIS & VMS)
strncpy does not guarantee to write the null terminator!
2004-10-07 09:01:39 +00:00
robocop
fd044f5851 Misc 2004-10-07 08:43:53 +00:00
robocop
7581e18254 Little simplification. 2004-10-07 08:33:51 +00:00
skidder
2ce8ec6f11 Report lock manager error code to the user when pessimistic lock conflict is encountered. This change fixes a problem with deadlock reporting for pessimistic locks so it should be backported to B1_5_Release 2004-10-07 06:15:09 +00:00
arnobrinkman
0209cf6c1f bugfix on previous commit 2004-10-06 11:44:03 +00:00
arnobrinkman
36f0cc2527 fix problem with duplicate keys and wrong second recordnumber order in IDX_create_index 2004-10-05 21:09:51 +00:00
dimitr
275673fcf1 Fixed possible resource leaks for procedured subqueries. 2004-10-05 20:16:29 +00:00
paul_reeves
20097b332b increment build number 2004-10-05 10:56:56 +00:00
paul_reeves
c65492d8d3 increment build number 2004-10-05 10:56:55 +00:00
paul_reeves
5b17ee1126 increment build number 2004-10-05 10:56:47 +00:00
hvlad
684a23096b increment build number 2004-10-05 07:03:46 +00:00
fsg
16a86758e6 increment build number 2004-10-05 01:09:06 +00:00
fsg
8ad5588f4c increment build number 2004-10-05 01:08:17 +00:00
alexpeshkoff
1809423469 increment build number 2004-10-04 16:55:16 +00:00
robocop
39547d4b1b increment build number 2004-10-04 08:47:51 +00:00
robocop
c23b1ec33f increment build number 2004-10-04 08:37:54 +00:00
robocop
d6f9a7874a Close vulnerability #6 in gds__interprete's new version.
In the loop, if several parameter exist, they are copied one after another in the same dynamic buffer. Therefore, for the 2nd param and more, we don't have the full buffer size to copy arguments, but only the remainder. Big buffer overflow could happen here.
If there's no buffer at all (from fix #5), the empty literal string is passed.
Now, fb_interpret seems ready to be used.
2004-10-04 08:37:49 +00:00
robocop
1999c4b699 increment build number 2004-10-04 08:15:02 +00:00
robocop
ed17cfafbf Style:
if<space>(
for<space>(
switch<space>(
while<space>(
2004-10-04 08:15:00 +00:00
robocop
af7009beab increment build number 2004-10-04 08:14:56 +00:00
robocop
cc4b4519b4 increment build number 2004-10-04 08:14:48 +00:00
robocop
9ae6ff9817 increment build number 2004-10-04 08:14:43 +00:00
robocop
d563607b99 increment build number 2004-10-04 08:14:39 +00:00
robocop
111568b907 increment build number 2004-10-04 08:07:36 +00:00
robocop
4964a1c7a1 Close vulnerability #5 in gds__interprete's new version, reported by Dmitry Sibiryakov.
When copying paramters to a dynamic buffer, the null terminator was written beyond the buffer's end.
Additionally, if there's no buffer at all (to be evident when fix #6 is posted), the empty literal string is passed.
2004-10-04 08:07:28 +00:00
robocop
43c46a29cd Close vulnerability #4 in gds__interprete's new version.
Static array with 10 places to hold pointers to parameters (isc_arg_string, isc_arg_number & isc_arg_cstring) may overflow in the loop that fills it and doesn't check bounds.
2004-10-04 07:38:28 +00:00
skidder
5ad0284800 increment build number 2004-10-04 05:23:59 +00:00
skidder
abf5277660 increment build number 2004-10-04 05:23:58 +00:00
robocop
77a26b2156 increment build number 2004-10-04 04:59:45 +00:00
robocop
e5ad0f1a7f Misc cleanup. 2004-10-04 04:59:43 +00:00
robocop
0535156358 increment build number 2004-10-04 04:59:42 +00:00
robocop
b231d30b4e increment build number 2004-10-04 04:45:06 +00:00
robocop
c3fb316461 increment build number 2004-10-04 04:44:53 +00:00
robocop
bdf5dea379 Close vulnerability #3 in gds__interprete's new version.
Traditional sprintf could write past the end of buffer.
2004-10-04 04:44:52 +00:00
robocop
b4704b7bf4 increment build number 2004-10-04 04:43:44 +00:00
robocop
54b61b6cd5 Totally misc: typo in comment. 2004-10-04 04:43:42 +00:00
robocop
a13558c917 increment build number 2004-10-04 04:42:58 +00:00
robocop
0a7c7d1860 Fix problem created by Blas' cleanup (went unnoticed at its due time).
sizeof(literal string) != sizeof(pointer to literal string)
Possible buffer overrun in one place.
2004-10-04 04:42:56 +00:00
robocop
c25fa7a153 increment build number 2004-10-04 04:39:59 +00:00
robocop
9b112424fa Months ago I marked a buffer overrun in deliver_request().
Now I think I've fixed it.
2004-10-04 04:39:55 +00:00
asfernandes
5631d1fa70 increment build number 2004-10-04 02:00:02 +00:00
asfernandes
a15eaca9a8 increment build number 2004-10-04 01:59:58 +00:00
asfernandes
df29eee21d increment build number 2004-10-03 23:05:31 +00:00
asfernandes
5c6760616c increment build number 2004-10-03 23:05:05 +00:00
asfernandes
ae724176ea increment build number 2004-10-03 23:05:01 +00:00
asfernandes
0ae648f26e increment build number 2004-10-03 23:05:00 +00:00
asfernandes
be9ca9c237 increment build number 2004-10-03 23:04:53 +00:00
asfernandes
12cc466cef increment build number 2004-10-03 23:04:39 +00:00
asfernandes
4eee6189a2 increment build number 2004-10-03 23:03:49 +00:00