From 60055f8dfde7251330d345c64f0963a2e11cd9d3 Mon Sep 17 00:00:00 2001 From: akr Date: Mon, 9 Nov 2015 15:37:04 +0000 Subject: * lib/resolv.rb (Resolv::DNS::Message::MessageEncoder#put_labels): Prevent overflow of pointer to labels. Patch by Hannes Georg. [ruby-core:71248] [Bug #11632] git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@52508 b2dd03c8-39d4-4d8f-98ff-823fe69b080e --- test/resolv/test_dns.rb | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) (limited to 'test/resolv') diff --git a/test/resolv/test_dns.rb b/test/resolv/test_dns.rb index e7857248ce..9f993ba96a 100644 --- a/test/resolv/test_dns.rb +++ b/test/resolv/test_dns.rb @@ -197,4 +197,21 @@ class TestResolvDNS < Test::Unit::TestCase expected = (['0'] * 32 + ['ip6', 'arpa']).map {|label| Resolv::DNS::Label::Str.new(label) } assert_equal(expected, labels) end + + def test_too_big_label_address + n = 2000 + m = Resolv::DNS::Message::MessageEncoder.new {|msg| + 2.times { + n.times {|i| msg.put_labels(["foo#{i}"]) } + } + } + Resolv::DNS::Message::MessageDecoder.new(m.to_s) {|msg| + 2.times { + n.times {|i| + assert_equal(["foo#{i}"], msg.get_labels.map {|label| label.to_s }) + } + } + } + assert_operator(2**14, :<, m.to_s.length) + end end -- cgit v1.2.3