1. 11 3月, 2021 1 次提交
  2. 09 9月, 2020 1 次提交
  3. 18 9月, 2019 1 次提交
  4. 26 9月, 2016 1 次提交
  5. 14 8月, 2016 1 次提交
  6. 29 7月, 2016 2 次提交
  7. 28 7月, 2016 1 次提交
  8. 27 7月, 2016 2 次提交
  9. 28 6月, 2016 2 次提交
  10. 13 6月, 2016 1 次提交
  11. 09 4月, 2016 2 次提交
  12. 26 6月, 2015 1 次提交
  13. 06 6月, 2015 1 次提交
  14. 21 5月, 2015 1 次提交
  15. 17 5月, 2015 2 次提交
  16. 22 10月, 2014 1 次提交
  17. 12 7月, 2014 1 次提交
  18. 27 6月, 2014 2 次提交
  19. 10 2月, 2014 7 次提交
  20. 23 1月, 2014 1 次提交
    • N
      modify iniparser to build unbounded keys & values from multi-line input · 1c91ade9
      Noel Power 提交于
      Instead of a size limit of ASCIILINESZ for multi-line input now there is no
      limit, a multi-line can be *any* size (and hence the key and value now
      also have a dynamic size)
      
      * there is a limit still on input line size (since multi lines are built
        from multiple lines where each line part is limited to ASCIILINESZ)
        Note: there is no limit to the size of the multi-line itself (it's
        only limited by available memory)
      * all stack & static fixed string usage has been removed with the exception
        of parsing line (or a multi-line portion) input, fgets still reads into
        a fixed string buffer of size ASCIILINESZ.
      Signed-off-by: NNoel Power <noel.power@suse.com>
      1c91ade9
  21. 10 1月, 2014 1 次提交
    • A
      Fix crash with crafted ini files. · 7b55dd38
      Andreas Schneider 提交于
      If the key or value is bigger than 1024 we will end up in a buffer
      overflow. The overflow is caught by _FORTIFY_SOURCE, so it's definitely
      DoS-only.  Curiously, because of ample space in the stack frame, it does
      not result in a crash without _FORTIFY_SOURCE in all cases.
      Signed-off-by: NAndreas Schneider <asn@samba.org>
      7b55dd38
  22. 22 5月, 2012 1 次提交
  23. 08 4月, 2012 1 次提交
  24. 04 4月, 2012 1 次提交
  25. 10 7月, 2011 1 次提交
  26. 09 7月, 2011 2 次提交
  27. 04 4月, 2011 1 次提交