aboutsummaryrefslogtreecommitdiffstats
path: root/main/libnice/0002-avoid-potential-integer-overflow.patch
diff options
context:
space:
mode:
authorLeo <thinkabit.ukim@gmail.com>2019-05-10 10:30:07 -0300
committerFrancesco Colista <fcolista@alpinelinux.org>2019-05-28 08:26:24 +0000
commit4c5c56a6d05856da0715687c72a3f14cc39dc1b6 (patch)
treee645062c39bdd683eb6012a1a6cdf3889e340a3a /main/libnice/0002-avoid-potential-integer-overflow.patch
parent6646db38523d2d089cb105bcf32165cc7d1f10aa (diff)
downloadaports-4c5c56a6d05856da0715687c72a3f14cc39dc1b6.tar.bz2
aports-4c5c56a6d05856da0715687c72a3f14cc39dc1b6.tar.xz
main/libnice: upgrade to 0.1.16
Diffstat (limited to 'main/libnice/0002-avoid-potential-integer-overflow.patch')
-rw-r--r--main/libnice/0002-avoid-potential-integer-overflow.patch32
1 files changed, 0 insertions, 32 deletions
diff --git a/main/libnice/0002-avoid-potential-integer-overflow.patch b/main/libnice/0002-avoid-potential-integer-overflow.patch
deleted file mode 100644
index d1e2fdf3e9..0000000000
--- a/main/libnice/0002-avoid-potential-integer-overflow.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From 6b1eec0630516698ac9cd3343ef7eb8515fee231 Mon Sep 17 00:00:00 2001
-From: Jakub Adam <jakub.adam@collabora.com>
-Date: Thu, 3 Jan 2019 21:26:41 +0100
-Subject: [PATCH] udp-turn: Avoid potential integer overflow
-
----
- socket/udp-turn.c | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/socket/udp-turn.c b/socket/udp-turn.c
-index 1bc5e031..c3b152d1 100644
---- a/socket/udp-turn.c
-+++ b/socket/udp-turn.c
-@@ -362,7 +362,7 @@ socket_recv_messages (NiceSocket *sock,
- guint f_buffer_len = priv->fragment_buffer->len;
-
- for (i = 0; i < n_recv_messages && f_buffer_len >= sizeof (guint16); ++i) {
-- guint16 msg_len = ((f_buffer[0] << 8) | f_buffer[1]) + sizeof (guint16);
-+ guint32 msg_len = ((f_buffer[0] << 8) | f_buffer[1]) + sizeof (guint16);
-
- if (msg_len > f_buffer_len) {
- /* The next message in the buffer isn't complete yet. Wait for more
-@@ -450,7 +450,7 @@ socket_recv_messages (NiceSocket *sock,
- if (nice_socket_is_reliable (sock) && parsed_buffer_length > 0) {
- /* Determine the portion of the current NiceInputMessage we can already
- * return. */
-- guint16 msg_len = 0;
-+ gint32 msg_len = 0;
- if (!priv->fragment_buffer) {
- msg_len = ((buffer[0] << 8) | buffer[1]) + sizeof (guint16);
- if (msg_len > parsed_buffer_length) {
-