Very Low Activity
36
I Use This!
Project Vulnerability Report

Commits : Listings

Analyzed 20 days ago. based on code collected 20 days ago.
Apr 15, 2015 — Apr 15, 2016
Commit Message Contributor Files Modified Lines Added Lines Removed Code Location Date
Prior fix for bug 128863 causes Star to take a SEGV in rqu_release_assoc() if the vnode contains invalid connection information, such as a bad password. Correct prior fix by ensuring rqu_release_assoc() is not called twice for connection errors to the target database. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 4 months ago
Submit missing changes to ulf.h. SIR 130477. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 6 months ago
Fixup STAR case where we do not support table comments. SIR 130484. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 6 months ago
Code Sprint 2015 Contribution from Thomas Christlieb: Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 6 months ago
Code Sprint 2015 Contribution from Geraint Jones: Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Code Sprint 2015 Contribution from Dean Vernon: Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Fix for Bug 128564 from Geraint Jones Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Code Sprint 2015 Contribtion from Doug Inkster: Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Code Sprint 2015 Contribution from Geraint Jones: Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Code Sprint 2015 Project: Greater accuracy in printqry times. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 7 months ago
Do not apply SET SCHEMA name to system catalogs. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 8 months ago
Fix up a buffer over-run in sha_finish_1024() for the sha384sum() case. Each H8() call writes 8 bytes to the digest. The digest is the result buffer from adu_sha384sum() or adu_sha512sum(). In the case of sha384sum() the result size is 48 bytes byte we were making sevin H8() calls leading to an 8 byte overrun. Also ensure pad is correctly established as a 128 byte buffer by adding the missing row of null values. This will ensure called routines do not copy past the end of the pad when padding. Anon32 d162f11b5a8d7c07fc6367be1e4b74a3bd74913fd4bf523b196f2996d02a1cc0 More... 12 months ago