Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 172.69.130.108
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
src /
glibc /
debian /
patches /
any /
[ HOME SHELL ]
Name
Size
Permission
Action
CVE-2023-4806-pre1.patch
1.7
KB
-rw-r--r--
CVE-2023-4806-pre10.patch
5.45
KB
-rw-r--r--
CVE-2023-4806-pre11.patch
5.99
KB
-rw-r--r--
CVE-2023-4806-pre12.patch
1.31
KB
-rw-r--r--
CVE-2023-4806-pre2.patch
7.2
KB
-rw-r--r--
CVE-2023-4806-pre3.patch
2.93
KB
-rw-r--r--
CVE-2023-4806-pre4.patch
8.29
KB
-rw-r--r--
CVE-2023-4806-pre5.patch
31.86
KB
-rw-r--r--
CVE-2023-4806-pre6.patch
4.75
KB
-rw-r--r--
CVE-2023-4806-pre7.patch
9.25
KB
-rw-r--r--
CVE-2023-4806-pre8.patch
19.66
KB
-rw-r--r--
CVE-2023-4806-pre9.patch
5.16
KB
-rw-r--r--
CVE-2023-4806.patch
12.16
KB
-rw-r--r--
CVE-2023-4813.patch
25.4
KB
-rw-r--r--
CVE-2023-4911.patch
2
KB
-rw-r--r--
CVE-2023-5156.patch
3.19
KB
-rw-r--r--
CVE-2024-2961.patch
6.92
KB
-rw-r--r--
CVE-2025-0395.patch
2.16
KB
-rw-r--r--
CVE-2025-4802.patch
2.44
KB
-rw-r--r--
git-surplus-tls-accounting.dif...
40.23
KB
-rw-r--r--
local-asserth-decls.diff
1.13
KB
-rw-r--r--
local-bindresvport_blacklist.d...
3.31
KB
-rw-r--r--
local-bootstrap-headers.diff
3.17
KB
-rw-r--r--
local-disable-libnss-db.diff
478
B
-rw-r--r--
local-fhs-linux-paths.diff
1
KB
-rw-r--r--
local-fhs-nscd.diff
855
B
-rw-r--r--
local-ld-multiarch.diff
1.32
KB
-rw-r--r--
local-ldconfig-ignore-ld.so.di...
1.47
KB
-rw-r--r--
local-ldconfig-multiarch.diff
1.51
KB
-rw-r--r--
local-ldso-disable-hwcap.diff
3.71
KB
-rw-r--r--
local-nss-overflow.diff
1.93
KB
-rw-r--r--
local-nss-upgrade.diff
956
B
-rw-r--r--
local-revert-bz13979.diff
1.43
KB
-rw-r--r--
local-stubs_h.diff
432
B
-rw-r--r--
local-tcsetaddr.diff
2.83
KB
-rw-r--r--
local-test-install.diff
612
B
-rw-r--r--
submitted-bits-fcntl_h-at.diff
5.08
KB
-rw-r--r--
submitted-ld.so-cache-new-form...
2.27
KB
-rw-r--r--
submitted-missing-etc-hosts.di...
306
B
-rw-r--r--
submitted-nptl-invalid-td.patc...
883
B
-rw-r--r--
submitted-resolv-unaligned.dif...
3.04
KB
-rw-r--r--
unsubmitted-ldso-machine-misma...
444
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : submitted-resolv-unaligned.diff
--- a/resolv/res_mkquery.c +++ b/resolv/res_mkquery.c @@ -95,6 +95,15 @@ #include <shlib-compat.h> #include <random-bits.h> +/* The structure HEADER is normally aligned to a word boundary and its + fields are accessed using word loads and stores. We need to access + this structure when it is aligned on a byte boundary. This can cause + problems on machines with strict alignment. So, we create a new + typedef to reduce its alignment to one. This ensures the fields are + accessed with byte loads and stores. */ +typedef HEADER __attribute__ ((__aligned__(1))) UHEADER; +#define HEADER UHEADER + int __res_context_mkquery (struct resolv_context *ctx, int op, const char *dname, int class, int type, const unsigned char *data, --- a/resolv/res_query.c +++ b/resolv/res_query.c @@ -81,6 +81,14 @@ #include <string.h> #include <shlib-compat.h> +/* The structure HEADER is normally aligned to a word boundary and its + fields are accessed using word loads and stores. We need to access + this structure when it is aligned on a byte boundary. This can cause + problems on machines with strict alignment. So, we create a new + typedef to reduce its alignment to one. This ensures the fields are + accessed with byte loads and stores. */ +typedef HEADER __attribute__ ((__aligned__(1))) UHEADER; + #if PACKETSZ > 65536 #define MAXPACKET PACKETSZ #else @@ -112,8 +120,8 @@ int *nanswerp2, int *resplen2, int *answerp2_malloced) { struct __res_state *statp = ctx->resp; - HEADER *hp = (HEADER *) answer; - HEADER *hp2; + UHEADER *hp = (UHEADER *) answer; + UHEADER *hp2; int n, use_malloc = 0; size_t bufsize = (type == T_QUERY_A_AND_AAAA ? 2 : 1) * QUERYSIZE; @@ -217,7 +225,7 @@ if (answerp != NULL) /* __res_context_send might have reallocated the buffer. */ - hp = (HEADER *) *answerp; + hp = (UHEADER *) *answerp; /* We simplify the following tests by assigning HP to HP2 or vice versa. It is easy to verify that this is the same as @@ -228,7 +236,7 @@ } else { - hp2 = (HEADER *) *answerp2; + hp2 = (UHEADER *) *answerp2; if (n < (int) sizeof (HEADER)) { hp = hp2; @@ -327,7 +335,7 @@ { struct __res_state *statp = ctx->resp; const char *cp; - HEADER *hp = (HEADER *) answer; + UHEADER *hp = (UHEADER *) answer; char tmp[NS_MAXDNAME]; u_int dots; int trailing_dot, ret, saved_herrno; --- a/resolv/res_send.c +++ b/resolv/res_send.c @@ -111,6 +111,15 @@ #include <libc-diag.h> #include <random-bits.h> +/* The structure HEADER is normally aligned to a word boundary and its + fields are accessed using word loads and stores. We need to access + this structure when it is aligned on a byte boundary. This can cause + problems on machines with strict alignment. So, we create a new + typedef to reduce its alignment to one. This ensures the fields are + accessed with byte loads and stores. */ +typedef HEADER __attribute__ ((__aligned__(1))) UHEADER; +#define HEADER UHEADER + #if PACKETSZ > 65536 #define MAXPACKET PACKETSZ #else
Close