Subversion Repositories Kolibri OS

Rev

Show changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff
8715 2d 09h Doczom /kernel/trunk/ fixed vulnerability (kernel memory rewrite) in sysfn 4  
8714 2d 10h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 7, 15.5 and 65  
8713 2d 10h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 47  
8712 2d 11h Doczom /kernel/trunk/gui/ fixed vulnerability (reading kernel memory from userspace) in sysfn 48.2  
8711 2d 14h Doczom /kernel/trunk/core/ fixed vulnerability (reading kernel memory from userspace) in sysfn 54.2  
8709 10d 07h Coldy / Dll autoload
Kernel
- removed unnecessary and rewrote/add some comments, no code changes
User (lib/dll.obj)
- Introduced new KX header as extension for existing formats
- Added staring KX header processing
- Improved import table test logic, no reason to kill app for import absence - skip
import processing (tnx ProMiNick)
- Add ReadMe.txt
 
8700 13d 17h Coldy /kernel/trunk/network/ Fix vulnerabilitie in sysfn 74.1 (add sanity check for user buffer), now user applications can't corrupt kernel memory via invalid buffer address  
8680 17d 02h rgimad /kernel/trunk/ fixed multiple vulnerabilities in sysfn70 caused by absence of user addresses check  
8676 19d 03h rgimad /kernel/trunk/fs/ fixed vulnerability (kernel memory rewrite) in sysfn 30.2 and 30.5  
8675 19d 04h rgimad /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn25  
8671 24d 15h Coldy /kernel/trunk/ For DLL autoload  
8670 25d 04h Alex2003 /kernel/branches/kolibri-e/ roadmap for kolibri e 0.1  
8656 41d 04h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Make sure 32bit trampoline is below 4GiB

This fixes booting via uefi64kos on some systems.
 
8599 79d 13h rgimad /kernel/trunk/gui/ fixed same vulnerability in sysfn 48.3  
8598 79d 14h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
8593 86d 10h rgimad /kernel/trunk/core/ taskman.inc: fixed two vulnerabilities which caused kernel memory corruption on attempt to run apps with illegal addresses in MENUET0x header  
8592 87d 00h rgimad /kernel/trunk/core/ taskman.inc: add comments for unobvious things, no code changes  
8552 105d 13h rgimad /kernel/trunk/gui/ fix bug in sysfn48 (by Kenshin)  
8534 119d 13h Coldy /kernel/trunk/core/ Fixed 69.4. Bug, call with PID=2 stops the system process thereby freezing the entire system!  
8493 133d 10h rgimad /kernel/trunk/ is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D )  

Show All