commit 69f631d93578026c42de78c0165983c036f7b135 from: Omar Polo date: Sun Jul 25 09:58:39 2021 UTC fix possible overflow sizeof(buf) should be equal to howmuch, otherwise we may end up reading with tls_read out of bounds and corrupting the stack. commit - d07b8b873f8ff0e2499a25910f9edc02611a7da3 commit + 69f631d93578026c42de78c0165983c036f7b135 blob - 3e6726f3b89de15d813296cfcb0f1ba9a6c22f14 blob + 99a98e62e7983cd13bbf1baba51ab642d96b05d0 --- net.c +++ net.c @@ -357,7 +357,7 @@ net_tls_readcb(int fd, short event, void *d) { struct bufferevent *bufev = d; struct req *req = bufev->cbarg; - char buf[BUFSIZ]; + char buf[IBUF_READ_SIZE]; int what = EVBUFFER_READ; int howmuch = IBUF_READ_SIZE; ssize_t ret;