fix some validation checks in dns response parsing code
authorRich Felker <dalias@aerifal.cx>
Tue, 3 Jun 2014 05:43:29 +0000 (01:43 -0400)
committerRich Felker <dalias@aerifal.cx>
Tue, 3 Jun 2014 05:43:29 +0000 (01:43 -0400)
since the buffer passed always has an actual size of 512 bytes, the
maximum possible response packet size, no out-of-bounds access was
possible; however, reading past the end of the valid portion of the
packet could cause the parser to attempt to process junk as answer
content.


No differences found