Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Evergreen:Maintenance:405
glibc.i686.openSUSE_13.1_Update
nss-dns-buffer-overflow.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File nss-dns-buffer-overflow.patch of Package glibc.i686.openSUSE_13.1_Update
2015-04-21 Arjun Shankar <arjun.is@lostca.se> [BZ #18287] * resolv/nss_dns/dns-host.c (getanswer_r): Adjust buffer length based on padding. (CVE-2015-1781) Index: glibc-2.18/resolv/nss_dns/dns-host.c =================================================================== --- glibc-2.18.orig/resolv/nss_dns/dns-host.c +++ glibc-2.18/resolv/nss_dns/dns-host.c @@ -613,7 +613,8 @@ getanswer_r (const querybuf *answer, int int have_to_map = 0; uintptr_t pad = -(uintptr_t) buffer % __alignof__ (struct host_data); buffer += pad; - if (__builtin_expect (buflen < sizeof (struct host_data) + pad, 0)) + buflen = buflen > pad ? buflen - pad : 0; + if (__builtin_expect (buflen < sizeof (struct host_data), 0)) { /* The buffer is too small. */ too_small:
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor