jnemeth
4ce238c9c6
Increase username length to match modern systems, and create #defines for a
...
couple of lengths.
2006-06-07 09:36:39 +00:00
jnemeth
ca1e1e9c7c
Actually accept "?" argument as documented in the manpage.
...
Don't attempt to ignore an untrappable signal.
Fix 6 possible buffer overflows.
2006-06-07 09:35:03 +00:00
jnemeth
c8e9ec4ee2
Don't follow symlinks on systems that have O_NOFOLLOW.
...
Don't bother looping with lockf() since first iteration would return.
Prevent two buffer overflows.
2006-06-07 09:30:35 +00:00
jnemeth
c7bfb55e4e
prevent "stack" overflow
2006-06-07 09:24:26 +00:00
jnemeth
29088d6b12
bracket else block
2006-06-07 09:22:52 +00:00
jnemeth
f05caa1c39
WARNS=4
2006-06-07 09:21:06 +00:00
drochner
3f13a4cf7b
Better check data read from tetris.scores before use as array indices etc.
...
This is CVE-2006-1539, files against Gentoo Linux, the patch is from
Gentoo.
A standard NetBSD installation is not as much risk because tetris is
sgid "games", and users shouldn't be in that group.
2006-06-01 16:12:27 +00:00
dan
f96b430610
read config more strictly, from Maximillian Dornseif
2006-05-25 07:11:54 +00:00
mrg
06b50ed8b9
don't try to switch a char and have a case of EOF - use an int.
2006-05-18 18:42:59 +00:00
christos
2854829efb
Remove dup Hitler fortune. One of the two fortunes I moved yesterday, was
...
already in the offensive set. From a NetBSD fan who prefers to be anonymous.
2006-05-17 14:47:58 +00:00
christos
4440541abb
PR/33495: Daniel Weiss: Offensive quote in netbsd fortune package
...
- Move 2 offensive to women Adolf Hitler quotes to fortune2-o
- s/Adolph/Adolf/
2006-05-16 20:13:50 +00:00
christos
bd02d883c4
Add a virtual destructor to avoid "future ABI issues". I love c++.
2006-05-14 06:38:04 +00:00
christos
ef47ce8264
add virtual destructors so that g++ shuts up.
2006-05-14 03:21:52 +00:00
christos
939d9a18de
Don't use iostream just for the usage message. Use stdio instead.
2006-05-14 03:21:23 +00:00
christos
47169552b3
XXX: GCC uninitialized
2006-05-14 03:15:50 +00:00
christos
a108a3f479
Coverity CID 3382: Fix memory leak.
2006-05-13 22:45:11 +00:00
christos
4b679b2a7f
Coverity CID 3383: Fix memory leak.
2006-05-13 22:43:02 +00:00
christos
dad51bf4f0
Coverity CID 3508: Fix file leak.
2006-05-13 22:29:53 +00:00
christos
2576ae5fca
Coverity CID 3269: Fix memory leak.
2006-05-13 22:28:04 +00:00
mrg
aadd7d4847
sprinkle some -fno-strict-aliasing and -Wno-pointer-sign with GCC4.
2006-05-11 23:16:28 +00:00
mrg
524d5f27c4
lrint() -> larn_lrint().
2006-05-11 10:23:24 +00:00
mrg
4bc6feceb6
end the argument list to exec*(3) with a NULL instead of a bare '0', as
...
the latter isn't a pointer context in these varargs functions.
2006-05-11 00:22:52 +00:00
mrg
8e969ac070
UC, PC and BC are provided my libtermcap, don't duplicate them.
2006-05-11 00:18:31 +00:00
mrg
bb1dac937d
avoid a pointer sign difference.
2006-05-11 00:17:07 +00:00
mrg
0c37c63edc
change (mostly) int to socklen_t. GCC 4 doesn't like that int and
...
socklen_t are different signness.
2006-05-09 20:18:05 +00:00
groo
cdb6398a72
Credit Alan Perlis for ``give him a lollipop'' programming language quote.
...
Hat tip: Jerry Leichter.
2006-04-26 00:52:21 +00:00
christos
1ce9f4326d
Coverity CID 3032: Prevent double free: Next to the call of page_more()
...
there is a comment saying /* does fclose */, but the next line calls
fclose(fp);. Go figure.
2006-04-24 20:08:54 +00:00
snj
a640fe8c43
It's "its."
2006-04-24 19:00:29 +00:00
snj
bf5ceaae16
It's "its."
2006-04-24 18:00:53 +00:00
drochner
d8da09bdaf
fix buffer overflow (CVE-2006-1744), from Debian
2006-04-20 10:57:26 +00:00
groo
bfdee53d40
Grammar nit. Never mind that it's still not true.
2006-04-06 19:47:23 +00:00
christos
a7a74df4fa
Coverity CID 2788: If no room gets returned, don't try to place a monster.
2006-04-02 00:13:29 +00:00
christos
8710461ab4
Coverity CID 2791: Fix file pointer leak.
2006-04-02 00:08:12 +00:00
jnemeth
e61c7de467
Coverity CID 2452: possible negative array index; CID 1518 and CID 1517: possible overrun of static array
2006-03-30 05:04:22 +00:00
jnemeth
1c3223f073
Coverity CID 1288: possible negative array index
2006-03-30 04:41:15 +00:00
jnemeth
67f465476e
Coverity CID 993: dereference of NULL pointer
2006-03-30 04:27:24 +00:00
jnemeth
cc2349eefc
Coverity CID 1293: not checking for an error return
2006-03-30 04:19:38 +00:00
jnemeth
fa4599a211
Coverity CID 1287: not checking for error return
2006-03-30 04:10:04 +00:00
jnemeth
995d4b331f
Coverity CID 1327: check for error return
2006-03-30 01:32:27 +00:00
jnemeth
a3fb5aa745
Bah! Compare, don't assign!
2006-03-30 01:31:13 +00:00
jnemeth
dce307414d
Coverity CID 1328: check for error return
2006-03-30 01:28:46 +00:00
jnemeth
f413c2ba58
Coverity CID 1326: check for error return
2006-03-30 01:25:52 +00:00
jnemeth
db7b70f433
Fix Coverity issue 891 -- FORWARD_NULL.
...
Approved by christos@.
2006-03-29 01:21:07 +00:00
jnemeth
83f277c49a
Fix Coverity issues 2366 and 2365 -- REVERSE_INULL.
...
Approved by Christos@.
2006-03-29 01:19:51 +00:00
jnemeth
2ad8d2c6cd
Fix Coverity issue 2584 -- USE_AFTER_FREE and issue 889 -- FORWARD_NULL.
...
Approved by christos@.
2006-03-29 01:18:39 +00:00
christos
93eceea780
Add missing parens.
2006-03-22 15:24:52 +00:00
christos
549b5ed9d1
Simplify (Masao Uebayashi)
2006-03-22 05:03:10 +00:00
christos
8b7bfd1f64
Coverity CID 692: Another && that should be ||. Boy...
2006-03-22 04:24:14 +00:00
christos
1990635dbb
Coverity CID 558: && should be obviously ||
2006-03-22 04:22:05 +00:00
christos
df3594a46a
Coverity CID 2735: Remove dead code.
2006-03-21 20:25:55 +00:00