Blame SOURCES/bind99-CVE-2015-8704.patch
|
|
e50659 |
diff --git a/lib/dns/rdata/in_1/apl_42.c b/lib/dns/rdata/in_1/apl_42.c
|
|
|
e50659 |
index eb927b9..df35025 100644
|
|
|
e50659 |
--- a/lib/dns/rdata/in_1/apl_42.c
|
|
|
e50659 |
+++ b/lib/dns/rdata/in_1/apl_42.c
|
|
|
e50659 |
@@ -116,7 +116,7 @@ totext_in_apl(ARGS_TOTEXT) {
|
|
|
e50659 |
isc_uint8_t len;
|
|
|
e50659 |
isc_boolean_t neg;
|
|
|
e50659 |
unsigned char buf[16];
|
|
|
e50659 |
- char txt[sizeof(" !64000")];
|
|
|
e50659 |
+ char txt[sizeof(" !64000:")];
|
|
|
e50659 |
const char *sep = "";
|
|
|
e50659 |
int n;
|
|
|
e50659 |
|
|
|
e50659 |
@@ -140,7 +140,7 @@ totext_in_apl(ARGS_TOTEXT) {
|
|
|
e50659 |
isc_region_consume(&sr, 1);
|
|
|
e50659 |
INSIST(len <= sr.length);
|
|
|
e50659 |
n = snprintf(txt, sizeof(txt), "%s%s%u:", sep,
|
|
|
e50659 |
- neg ? "!": "", afi);
|
|
|
e50659 |
+ neg ? "!" : "", afi);
|
|
|
e50659 |
INSIST(n < (int)sizeof(txt));
|
|
|
e50659 |
RETERR(str_totext(txt, target));
|
|
|
e50659 |
switch (afi) {
|