[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Bug-wget] [PATCH 21/25] Bugfix: Detect malformed base64 Metalink/HTTP D
From: |
Matthew White |
Subject: |
[Bug-wget] [PATCH 21/25] Bugfix: Detect malformed base64 Metalink/HTTP Digest header |
Date: |
Sat, 10 Sep 2016 12:59:36 +0200 |
[Coverity Scan is ok, make syntax-check is ok, make check-valgrind is ok,
contrib/check-hard is ok]
Before this patch, a malformed base64 Metalink/HTTP Digest header was causing a
memory exaustion.
This introduces the ability to properly detect and discard a malformed base64
Metalink/HTTP Digest header.
The following description is verbatim from the patch:
-----
On malformed base64 input, ssize_t base64_decode() returns -1. Such
value is too big for a size_t variable, and used as xmalloc() value
will exaust all the memory.
-----
Regards,
Matthew
--
Matthew White <address@hidden>
0021-Bugfix-Detect-malformed-base64-Metalink-HTTP-Digest-.patch
Description: Text Data
pgpJOJicVwDfJ.pgp
Description: PGP signature
- [Bug-wget] [PATCH 21/25] Bugfix: Detect malformed base64 Metalink/HTTP Digest header,
Matthew White <=