this bug was introduced in the recent resolver overhaul commits. it
likely had visible symptoms. these were probably limited to wrongly
accepting truncated versions of over-long names (vs rejecting them),
as opposed to stack-based overflows or anything more severe, but no
extensive checks were made. there have been no releases where this bug
was present.
static int is_valid_hostname(const char *host)
{
const unsigned char *s;
- if (strnlen(host, 255)-1 > 254 || mbstowcs(0, host, 0) > 255) return 0;
+ if (strnlen(host, 256)-1 > 254 || mbstowcs(0, host, 0) > 255) return 0;
for (s=(void *)host; *s>=0x80 || *s=='.' || *s=='-' || isalnum(*s); s++);
return !*s;
}
*canon = 0;
if (name) {
size_t l;
- if ((l = strnlen(name, 255))-1 > 254)
+ if ((l = strnlen(name, 256))-1 > 254)
return EAI_NONAME;
memcpy(canon, name, l+1);
}