| Summary: | DNS resolver can fail for large DNS responses | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | john <john> | ||||
| Component: | bin | Assignee: | Doug Barton <dougb> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Only Me | ||||||
| Priority: | Normal | ||||||
| Version: | 3.4-STABLE | ||||||
| Hardware: | Any | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
|
Description
john
2000-04-26 06:30:02 UTC
I didn't return the truncated response because I was worried about
whether all the relevant functions handled truncated responses.
Have you checked this?
>@@ -666,7 +669,6 @@
> }
> if (n > sizeof buf.buf) {
> dprintf("static buffer is too small (%d)\n", n);
>- return (NULL);
> }
> if (!(hp = gethostanswer(&buf, n, qbuf, T_PTR)))
> return (NULL); /* h_errno was set by gethostanswer() */
Didn't you just reintroduce the buffer overrun? (e.g. you at least want
to truncate n to sizeof buf.buf)
Bill
State Changed From-To: open->feedback Can you test this problem with an up to date -current or -stable and report your findings please? Responsible Changed From-To: freebsd-bugs->dougb I'll handle the feedback. State Changed From-To: feedback->closed Feedback timeout. |