diff options
author | Matthieu Patou <mat@matws.net> | 2013-09-19 11:18:32 -0700 |
---|---|---|
committer | Volker Lendecke <vl@samba.org> | 2013-09-20 04:46:47 +0200 |
commit | ea3db09f696b199171e78720d95197f458b15e93 (patch) | |
tree | dfa3b36b7b63f64da00039636738804ad1d2ee26 /source3/smbd | |
parent | b2b948a1d01982613dc53ac926842f1d144b6841 (diff) | |
download | samba-ea3db09f696b199171e78720d95197f458b15e93.tar.gz samba-ea3db09f696b199171e78720d95197f458b15e93.tar.bz2 samba-ea3db09f696b199171e78720d95197f458b15e93.zip |
libcli: continue to read from the socket even if the size is 0
This is an issue found by Codenomicon, with a malicious packet with 0
bytes UDP payload we will continiously be looping trying to react from
the socket event and continiously do nothing as we will bail out
thinking that we had a memory allocation error.
Original fix comes from Volker Lendecke <vl@samba.org>
Signed-off-by: Matthieu Patou <mat@matws.net>
Reviewed-by: Volker Lendecke <vl@samba.org>
Autobuild-User(master): Volker Lendecke <vl@samba.org>
Autobuild-Date(master): Fri Sep 20 04:46:47 CEST 2013 on sn-devel-104
Diffstat (limited to 'source3/smbd')
0 files changed, 0 insertions, 0 deletions