summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjasper <jasper@openbsd.org>2010-02-03 17:42:30 +0000
committerjasper <jasper@openbsd.org>2010-02-03 17:42:30 +0000
commit15fa1f610f304cd771a6bff0025b5f604f38f1dc (patch)
tree9c7d20f50ad9403f9e2cba777cafc994a39eeefc
parentArgh, typo in macro name. (diff)
downloadwireguard-openbsd-15fa1f610f304cd771a6bff0025b5f604f38f1dc.tar.xz
wireguard-openbsd-15fa1f610f304cd771a6bff0025b5f604f38f1dc.zip
Add a SECURITY FIX for CVE-2010-0010
"on 64-bit platforms this allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow." "looks good" to henning@ ok otto@
-rw-r--r--usr.sbin/httpd/src/modules/proxy/proxy_util.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/usr.sbin/httpd/src/modules/proxy/proxy_util.c b/usr.sbin/httpd/src/modules/proxy/proxy_util.c
index d06f26246b3..e0702b7d8fc 100644
--- a/usr.sbin/httpd/src/modules/proxy/proxy_util.c
+++ b/usr.sbin/httpd/src/modules/proxy/proxy_util.c
@@ -544,7 +544,7 @@ long int ap_proxy_send_fb(BUFF *f, request_rec *r, cache_req *c, off_t len, int
/* read the chunk */
if (remaining > 0) {
- n = ap_bread(f, buf, MIN((int)buf_size, (int)remaining));
+ n = ap_bread(f, buf, (int) MIN(buf_size, remaining));
if (n > -1) {
remaining -= n;
end_of_chunk = (remaining == 0);
@@ -585,8 +585,8 @@ long int ap_proxy_send_fb(BUFF *f, request_rec *r, cache_req *c, off_t len, int
n = ap_bread(f, buf, buf_size);
}
else {
- n = ap_bread(f, buf, MIN((int)buf_size,
- (int)(len - total_bytes_rcvd)));
+ n = ap_bread(f, buf, (int) MIN(buf_size,
+ (len - total_bytes_rcvd)));
}
}