|  | Commit message (Collapse) | Author | Age | Files | Lines | 
|---|
| | 
| 
| 
| | From FreeBSD (glebius) | 
| | 
| 
| 
| | From Henri Kemppainen | 
| | 
| 
| 
| 
| 
| 
| | A specially crafted struct sockaddr_dl argument can trigger a stack
overflow of a static buffer in libc.  An attacker may be able to
use this to write to arbitrary locations in the data segment.
From FreeBSD (glebius); OK deraadt@ mestre@ | 
| | 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| 
| | a sockaddr_dl is a questionnable interface.  But now it makes it harder
to properly reference ifp becauses of this.
Set sdl_index to the index of the corresponding interface when
constructing a routing message.
Ridding previous libc crank.
ok guenther@, deraadt@, dlg@ | 
| | 
| 
| 
| 
| 
| 
| | split functions off res_debug.c so that getnetnamadr.c does not pull it
all when it's used.
okay deraadt@, krw@ | 
| | |  | 
| | 
| 
| 
| | rescinded 22 July 1999.  Proofed by myself and Theo. | 
| | 
| 
| 
| | Make sure everything uses {SYS,}LIBC_SCCS properly | 
|  |  |