Age | Commit message (Collapse) | Author | |
---|---|---|---|
2010-10-26 | ei: check the length of the node name | Michael Santos | |
Check the length of the node name to prevent an overflow. | |||
2010-09-13 | Merge branch 'pan/epmd-vulnerabilities/OTP-8780' into dev | Patrik Nyblom | |
* pan/epmd-vulnerabilities/OTP-8780: Teach testcases to survive TIME_WAIT overload Update erl_interface doc and testsuite for epmd changes Restore null termination of input buffer Teach testcase epmd_SUITE:too_large to accept econnaborted Teach epmd_cli.c to not respond 'Killed' when killing denied Calculate minimal packet size for ALIVE2 requests correctly Document epmd and it's options properly and fixup help text Fix anomalies in epmd not yet reported as security issues Remove two buffer overflow vulnerabilities in EPMD Remove all support for ancient EPMD protocol Remove very old protocol from EPMD Conflicts: lib/erl_interface/src/epmd/epmd_port.c | |||
2010-08-31 | Remove all support for ancient EPMD protocol | Patrik Nyblom | |
2010-08-23 | ei: prevent overflow in ei_connect_init/ei_xconnect | Michael Santos | |
Check the length of the buffer before copying. ei_cnode ec; struct in_addr addr; char *node = (char *)calloc(5001, 1); (void)memset(node, 'x', 5000); ei_connect_init(&ec, node, "", 0); addr.s_addr = inet_addr("192.168.1.1"); ei_xconnect(&ec, &addr, node); | |||
2009-11-20 | The R13B03 release.OTP_R13B03 | Erlang/OTP | |