From 126d53fba4653b7a1c4b94b26cc1c387ac524e6c Mon Sep 17 00:00:00 2001 From: Matthias Hopf Date: Tue, 6 Jun 2006 16:39:25 +0000 Subject: Fixed input buffer size check (using correct size). (CVE-2006-2802) CVS patchset: 8014 CVS date: 2006/06/06 16:39:25 --- src/input/input_http.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src') diff --git a/src/input/input_http.c b/src/input/input_http.c index 8d8a3b488..07a38f60b 100644 --- a/src/input/input_http.c +++ b/src/input/input_http.c @@ -19,7 +19,7 @@ * * input plugin for http network streams * - * $Id: input_http.c,v 1.117 2006/06/02 22:44:58 dsalt Exp $ + * $Id: input_http.c,v 1.118 2006/06/06 16:39:25 mshopf Exp $ */ #ifdef HAVE_CONFIG_H @@ -900,10 +900,10 @@ static int http_plugin_open (input_plugin_t *this_gen ) { len = 0; } else len ++; - if ( len >= buflen ) { + if ( len >= BUFSIZE ) { _x_message(this->stream, XINE_MSG_PERMISSION_ERROR, this->mrl, NULL); xine_log (this->stream->xine, XINE_LOG_MSG, - _("input_http: buffer exhausted after %d bytes."), buflen); + _("input_http: buffer exhausted after %d bytes."), BUFSIZE); return 0; } } -- cgit v1.2.3