Blame SOURCES/mod_nss-overlapping_memcpy.patch
|
|
90ca4f |
Bug 669118
|
|
|
90ca4f |
|
|
|
90ca4f |
memcpy of overlapping memory is no longer allowed by glibc.
|
|
|
90ca4f |
|
|
|
90ca4f |
This is mod_ssl bug https://issues.apache.org/bugzilla/show_bug.cgi?id=45444
|
|
|
90ca4f |
|
|
|
90ca4f |
--- mod_nss-1.0.8.orig/nss_engine_io.c 2011-01-12 12:31:27.339425702 -0500
|
|
|
90ca4f |
+++ mod_nss-1.0.8/nss_engine_io.c 2011-01-12 12:31:35.507405595 -0500
|
|
|
90ca4f |
@@ -123,13 +123,13 @@
|
|
|
90ca4f |
|
|
|
90ca4f |
if (buffer->length > inl) {
|
|
|
90ca4f |
/* we have have enough to fill the caller's buffer */
|
|
|
90ca4f |
- memcpy(in, buffer->value, inl);
|
|
|
90ca4f |
+ memmove(in, buffer->value, inl);
|
|
|
90ca4f |
buffer->value += inl;
|
|
|
90ca4f |
buffer->length -= inl;
|
|
|
90ca4f |
}
|
|
|
90ca4f |
else {
|
|
|
90ca4f |
/* swallow remainder of the buffer */
|
|
|
90ca4f |
- memcpy(in, buffer->value, buffer->length);
|
|
|
90ca4f |
+ memmove(in, buffer->value, buffer->length);
|
|
|
90ca4f |
inl = buffer->length;
|
|
|
90ca4f |
buffer->value = NULL;
|
|
|
90ca4f |
buffer->length = 0;
|