isc_buffer_init() is given MAX_DNS_MESSAGE_SIZE (65535) as capacity but
only h2->content_length bytes are allocated. This makes the buffer
believe it has more space than actually allocated. A secondary bounds
check (new_bufsize <= h2->content_length) prevents actual overflow, but
the buffer invariant is violated.
Pass h2->content_length as the capacity to match the allocation.
&h2->rbuf,
isc_mem_allocate(mctx,
h2->content_length),
- MAX_DNS_MESSAGE_SIZE);
+ h2->content_length);
}
size_t new_bufsize = isc_buffer_usedlength(&h2->rbuf) +
len;
- if (new_bufsize <= MAX_DNS_MESSAGE_SIZE &&
- new_bufsize <= h2->content_length)
- {
+ if (new_bufsize <= h2->content_length) {
session->processed_useful_data += len;
isc_buffer_putmem(&h2->rbuf, data, len);
break;