Subversion Repositories Kolibri OS

Rev

Go to most recent revision | Hide changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff Changes
8835 1072 d 15 h Boppan /kernel/trunk/ [kernel][asmxygen.py] Disable clean_generated_stuff flag by default  
/kernel/trunk/asmxygen.py
8834 1072 d 15 h Boppan /kernel/trunk/ [kernel] Make asmxygen generate doxygen C-like files in docs/doxygen and implement very basic variable doxygen generation  
/kernel/trunk/docs/doxygen
/kernel/trunk/docs/doxygen/doxygen.cfg
/kernel/trunk/asmxygen.py
8825 1073 d 3 h Boppan /kernel/trunk/ [kernel] Prepare for kernel documentation (add asmxygen.py)  
/kernel/trunk/asmxygen.py
8715 1107 d 9 h Doczom /kernel/trunk/ fixed vulnerability (kernel memory rewrite) in sysfn 4  
/kernel/trunk/kernel.asm
8714 1107 d 9 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 7, 15.5 and 65  
/kernel/trunk/kernel.asm
8713 1107 d 10 h Doczom /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn 47  
/kernel/trunk/kernel.asm
8712 1107 d 11 h Doczom /kernel/trunk/gui/ fixed vulnerability (reading kernel memory from userspace) in sysfn 48.2  
/kernel/trunk/gui/window.inc
8711 1107 d 14 h Doczom /kernel/trunk/core/ fixed vulnerability (reading kernel memory from userspace) in sysfn 54.2  
/kernel/trunk/core/clipboard.inc
8709 1115 d 7 h Coldy / Dll autoload
Kernel
- removed unnecessary and rewrote/add some comments, no code changes
User (lib/dll.obj)
- Introduced new KX header as extension for existing formats
- Added staring KX header processing
- Improved import table test logic, no reason to kill app for import absence - skip
import processing (tnx ProMiNick)
- Add ReadMe.txt
 
/programs/develop/libraries/dll/ReadMe.txt
/kernel/trunk/core/taskman.inc
/programs/develop/libraries/dll/dll.asm
8700 1118 d 17 h Coldy /kernel/trunk/network/ Fix vulnerabilitie in sysfn 74.1 (add sanity check for user buffer), now user applications can't corrupt kernel memory via invalid buffer address  
/kernel/trunk/network/stack.inc
8680 1122 d 2 h rgimad /kernel/trunk/ fixed multiple vulnerabilities in sysfn70 caused by absence of user addresses check  
/kernel/trunk/core/dll.inc
/kernel/trunk/core/syscall.inc
/kernel/trunk/fs/fs_lfn.inc
8676 1124 d 3 h rgimad /kernel/trunk/fs/ fixed vulnerability (kernel memory rewrite) in sysfn 30.2 and 30.5  
/kernel/trunk/fs/fs_lfn.inc
8675 1124 d 4 h rgimad /kernel/trunk/ fixed vulnerability (reading kernel memory from userspace) in sysfn25  
/kernel/trunk/kernel.asm
8671 1129 d 15 h Coldy /kernel/trunk/ For DLL autoload  
/kernel/trunk/core/taskman.inc
/kernel/trunk/data32.inc
8670 1130 d 4 h Alex2003 /kernel/branches/kolibri-e/ roadmap for kolibri e 0.1  
/kernel/branches/kolibri-e/roadmap_v0.1.txt
8656 1146 d 4 h dunkaist /kernel/trunk/bootloader/uefi4kos/ uefi4kos: Make sure 32bit trampoline is below 4GiB

This fixes booting via uefi64kos on some systems.
 
/kernel/trunk/bootloader/uefi4kos/uefi64kos.asm
8599 1184 d 12 h rgimad /kernel/trunk/gui/ fixed same vulnerability in sysfn 48.3  
/kernel/trunk/gui/window.inc
8598 1184 d 14 h rgimad /kernel/trunk/ fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address  
/kernel/trunk/kernel.asm
8593 1191 d 10 h rgimad /kernel/trunk/core/ taskman.inc: fixed two vulnerabilities which caused kernel memory corruption on attempt to run apps with illegal addresses in MENUET0x header  
/kernel/trunk/core/taskman.inc
8592 1192 d 0 h rgimad /kernel/trunk/core/ taskman.inc: add comments for unobvious things, no code changes  
/kernel/trunk/core/taskman.inc

Show All