mailing list of musl libc
 help / color / mirror / code / Atom feed
* gethostbyname buffer overflow (glibc)
@ 2015-01-27 16:59 Daniel Cegiełka
  2015-01-27 17:10 ` Rich Felker
  0 siblings, 1 reply; 3+ messages in thread
From: Daniel Cegiełka @ 2015-01-27 16:59 UTC (permalink / raw)
  To: musl

eg from:

http://www.openwall.com/lists/oss-security/2015/01/27/9

# gcc ghost.c && ./a.out
should not happen


  retval = gethostbyname_r(name, &resbuf, temp.buffer,
sizeof(temp.buffer), &result, &herrno);

  if (strcmp(temp.canary, CANARY) != 0) {
    puts("vulnerable");
    exit(EXIT_SUCCESS);
  }
  if (retval == ERANGE) {
    puts("not vulnerable");
    exit(EXIT_SUCCESS);
  }
  puts("should not happen");
  exit(EXIT_FAILURE);

Double exit. Is something wrong with gethostbyname_r() in musl?

Daniel


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-01-27 17:23 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-01-27 16:59 gethostbyname buffer overflow (glibc) Daniel Cegiełka
2015-01-27 17:10 ` Rich Felker
2015-01-27 17:23   ` Daniel Cegiełka

Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/musl/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).