2 # Parent f2742ea6dd04e8f034c24b3dc40532fdfff6a842
4 diff -r f2742ea6dd04 ircd/whocmds.c
5 --- a/ircd/whocmds.c Sun Jul 14 18:26:15 2013 +0100
6 +++ b/ircd/whocmds.c Sun Jul 14 18:26:35 2013 +0100
9 struct Membership *chan = 0;
11 - static char buf1[512];
12 + static char buf1[1024];
13 /* NOTE: with current fields list and sizes this _cannot_ overrun,
14 and also the message finally sent shouldn't ever be truncated */
15 + /* NOTE2: HACK this has been doubled to 1024 as we're getting far too close...
16 + ideally this would be rewritten but that's likely to introduce more bugs.
17 + truncation is better than a buffer overflow exploit...
18 + now we truncate to 512 manually at the end of the function,
19 + I guess it's truncated in one of the functions in send_reply too... */
24 need to terminate buf1 */
30 send_reply(sptr, fields ? RPL_WHOSPCRPL : RPL_WHOREPLY, ++p1);