1. 09 9月, 2020 1 次提交
  2. 18 9月, 2019 1 次提交
  3. 26 9月, 2016 1 次提交
  4. 14 8月, 2016 1 次提交
  5. 29 7月, 2016 2 次提交
  6. 28 7月, 2016 1 次提交
  7. 27 7月, 2016 2 次提交
  8. 28 6月, 2016 2 次提交
  9. 13 6月, 2016 1 次提交
  10. 09 4月, 2016 2 次提交
  11. 26 6月, 2015 1 次提交
  12. 06 6月, 2015 1 次提交
  13. 21 5月, 2015 1 次提交
  14. 17 5月, 2015 2 次提交
  15. 22 10月, 2014 1 次提交
  16. 12 7月, 2014 1 次提交
  17. 27 6月, 2014 2 次提交
  18. 10 2月, 2014 7 次提交
  19. 23 1月, 2014 1 次提交
    • N
      modify iniparser to build unbounded keys & values from multi-line input · 1c91ade9
      Noel Power 提交于
      Instead of a size limit of ASCIILINESZ for multi-line input now there is no
      limit, a multi-line can be *any* size (and hence the key and value now
      also have a dynamic size)
      
      * there is a limit still on input line size (since multi lines are built
        from multiple lines where each line part is limited to ASCIILINESZ)
        Note: there is no limit to the size of the multi-line itself (it's
        only limited by available memory)
      * all stack & static fixed string usage has been removed with the exception
        of parsing line (or a multi-line portion) input, fgets still reads into
        a fixed string buffer of size ASCIILINESZ.
      Signed-off-by: NNoel Power <noel.power@suse.com>
      1c91ade9
  20. 10 1月, 2014 1 次提交
    • A
      Fix crash with crafted ini files. · 7b55dd38
      Andreas Schneider 提交于
      If the key or value is bigger than 1024 we will end up in a buffer
      overflow. The overflow is caught by _FORTIFY_SOURCE, so it's definitely
      DoS-only.  Curiously, because of ample space in the stack frame, it does
      not result in a crash without _FORTIFY_SOURCE in all cases.
      Signed-off-by: NAndreas Schneider <asn@samba.org>
      7b55dd38
  21. 22 5月, 2012 1 次提交
  22. 08 4月, 2012 1 次提交
  23. 04 4月, 2012 1 次提交
  24. 10 7月, 2011 1 次提交
  25. 09 7月, 2011 2 次提交
  26. 04 4月, 2011 1 次提交
  27. 29 3月, 2011 1 次提交