Blame SOURCES/libyaml-CVE-2013-6393-string-overflow.patch

cb67ac
# HG changeset patch
cb67ac
# User Florian Weimer <fweimer@redhat.com>
cb67ac
# Date 1389273500 -3600
cb67ac
#      Thu Jan 09 14:18:20 2014 +0100
cb67ac
# Node ID a54d7af707f25dc298a7be60fd152001d2b3035b
cb67ac
# Parent  3e6507fa0c26d20c09f8f468f2bd04aa2fd1b5b5
cb67ac
yaml_parser_scan_tag_uri: fix int overflow leading to buffer overflow
cb67ac
cb67ac
diff --git a/src/scanner.c b/src/scanner.c
cb67ac
--- a/src/scanner.c
cb67ac
+++ b/src/scanner.c
cb67ac
@@ -2574,7 +2574,7 @@
cb67ac
 
cb67ac
     /* Resize the string to include the head. */
cb67ac
 
cb67ac
-    while (string.end - string.start <= (int)length) {
cb67ac
+    while ((size_t)(string.end - string.start) <= length) {
cb67ac
         if (!yaml_string_extend(&string.start, &string.pointer, &string.end)) {
cb67ac
             parser->error = YAML_MEMORY_ERROR;
cb67ac
             goto error;