From 8185891e28635bdb83fdf4ba4391030912dae596 Mon Sep 17 00:00:00 2001 From: Nicolás Reynolds Date: Tue, 18 Feb 2014 01:56:34 +0000 Subject: Tue Feb 18 01:56:27 UTC 2014 --- ....15-__libc_res_nquerydomain-out-of-bounds.patch | 24 ++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cross/cross-mips64el-unknown-linux-gnu-glibc-headers/glibc-2.15-__libc_res_nquerydomain-out-of-bounds.patch (limited to 'cross/cross-mips64el-unknown-linux-gnu-glibc-headers/glibc-2.15-__libc_res_nquerydomain-out-of-bounds.patch') diff --git a/cross/cross-mips64el-unknown-linux-gnu-glibc-headers/glibc-2.15-__libc_res_nquerydomain-out-of-bounds.patch b/cross/cross-mips64el-unknown-linux-gnu-glibc-headers/glibc-2.15-__libc_res_nquerydomain-out-of-bounds.patch new file mode 100644 index 000000000..6f0a0398f --- /dev/null +++ b/cross/cross-mips64el-unknown-linux-gnu-glibc-headers/glibc-2.15-__libc_res_nquerydomain-out-of-bounds.patch @@ -0,0 +1,24 @@ +diff --git a/resolv/res_query.c b/resolv/res_query.c +index 947c651..abccd4a 100644 +--- a/resolv/res_query.c ++++ b/resolv/res_query.c +@@ -556,12 +556,16 @@ __libc_res_nquerydomain(res_state statp, + * copy without '.' if present. + */ + n = strlen(name); +- if (n >= MAXDNAME) { ++ ++ /* Decrement N prior to checking it against MAXDNAME ++ so that we detect a wrap to SIZE_MAX and return ++ a reasonable error. */ ++ n--; ++ if (n >= MAXDNAME - 1) { + RES_SET_H_ERRNO(statp, NO_RECOVERY); + return (-1); + } +- n--; +- if (n >= 0 && name[n] == '.') { ++ if (name[n] == '.') { + strncpy(nbuf, name, n); + nbuf[n] = '\0'; + } else -- cgit v1.2.3-54-g00ecf