aboutsummaryrefslogtreecommitdiffstats
path: root/main/musl/fix-single-byte-overflow.patch
diff options
context:
space:
mode:
Diffstat (limited to 'main/musl/fix-single-byte-overflow.patch')
-rw-r--r--main/musl/fix-single-byte-overflow.patch32
1 files changed, 0 insertions, 32 deletions
diff --git a/main/musl/fix-single-byte-overflow.patch b/main/musl/fix-single-byte-overflow.patch
deleted file mode 100644
index ffc5b3551c..0000000000
--- a/main/musl/fix-single-byte-overflow.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From b114190b29417fff6f701eea3a3b3b6030338280 Mon Sep 17 00:00:00 2001
-From: Rich Felker <dalias@aerifal.cx>
-Date: Sat, 24 Oct 2015 22:42:10 -0400
-Subject: fix single-byte overflow of malloc'd buffer in getdelim
-
-the buffer enlargement logic here accounted for the terminating null
-byte, but not for the possibility of hitting the delimiter in the
-buffer-refill code path that uses getc_unlocked, in which case two
-additional bytes (the delimiter and the null termination) are written
-without another chance to enlarge the buffer.
-
-this patch and the corresponding bug report are by Felix Janda.
----
- src/stdio/getdelim.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/stdio/getdelim.c b/src/stdio/getdelim.c
-index a88c393..3077490 100644
---- a/src/stdio/getdelim.c
-+++ b/src/stdio/getdelim.c
-@@ -27,7 +27,7 @@ ssize_t getdelim(char **restrict s, size_t *restrict n, int delim, FILE *restric
- for (;;) {
- z = memchr(f->rpos, delim, f->rend - f->rpos);
- k = z ? z - f->rpos + 1 : f->rend - f->rpos;
-- if (i+k >= *n) {
-+ if (i+k+1 >= *n) {
- if (k >= SIZE_MAX/2-i) goto oom;
- *n = i+k+2;
- if (*n < SIZE_MAX/4) *n *= 2;
---
-cgit v0.11.2
-