Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

enum: fix buffer overflow and increase maximum number length #186

Merged
merged 1 commit into from Jun 3, 2015

Conversation

norox
Copy link

@norox norox commented Jun 3, 2015

  • Fix for buffer overflow in enum_pv_query_3 for char string[17] where the boundary checks for it in is_e164 uses MAX_NUM_LEN.
  • Increased the size of MAX_NUM_LEN to 33 to support the maximum number length of 32, which is what we support here on our ISUP links.

Bug: The buffer overflow bug can be triggered by calling enum_pv_query with a number that is to long eg. +1234567890123456789

…e the boundary checks for it in is_e164 uses MAX_NUM_LEN.

* Increased the size of MAX_NUM_LEN to 33 to support the maximum number length of 32, which is what we support here on our ISUP links.

Bug: The buffer overflow bug can be triggered by calling enum_pv_query with a number that is to long eg. +1234567890123456789
@miconda
Copy link
Member

miconda commented Jun 3, 2015

Going to merge it.

For the future, format the commit message based on suggestions at:

Thanks

@miconda
Copy link
Member

miconda commented Jun 3, 2015

Ahh, actually the commit message is properly formatted. Ignore my previous note.

miconda added a commit that referenced this pull request Jun 3, 2015
enum: fix buffer overflow and increase maximum number length
@miconda miconda merged commit 498e225 into kamailio:master Jun 3, 2015
@norox
Copy link
Author

norox commented Jun 3, 2015

Ok, thank you for merging the fix.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants