protocol/ArgParser: fix integer overflow in parse_range()
Casting std::numeric_limits<unsigned>::max() to "long" leads to an overflow if sizeof(unsigned)==sizeof(long), and the result will be -1. This happens on some 32 bit architectures, for example ARM and WIN32. Workaround: use std::numeric_limits<int>::max(), which is the largest signed integer. Since sizeof(long)>=sizeof(int), this will never overflow. Fixes Mantis ticket 0004080.
This commit is contained in:
parent
4907f610d6
commit
421c4ae907
2
NEWS
2
NEWS
|
@ -1,4 +1,6 @@
|
|||
ver 0.18.14 (not yet released)
|
||||
* protocol
|
||||
- fix range parser bug on certain 32 bit architectures
|
||||
|
||||
ver 0.18.13 (2014/08/31)
|
||||
* protocol
|
||||
|
|
|
@ -81,7 +81,7 @@ check_range(Client &client, unsigned *value_r1, unsigned *value_r2,
|
|||
/* compatibility with older MPD versions: specifying
|
||||
"-1" makes MPD display the whole list */
|
||||
*value_r1 = 0;
|
||||
*value_r2 = std::numeric_limits<unsigned>::max();
|
||||
*value_r2 = std::numeric_limits<int>::max();
|
||||
return true;
|
||||
}
|
||||
|
||||
|
@ -108,7 +108,7 @@ check_range(Client &client, unsigned *value_r1, unsigned *value_r2,
|
|||
}
|
||||
|
||||
if (test == test2)
|
||||
value = std::numeric_limits<unsigned>::max();
|
||||
value = std::numeric_limits<int>::max();
|
||||
|
||||
if (value < 0) {
|
||||
command_error(client, ACK_ERROR_ARG,
|
||||
|
|
Loading…
Reference in New Issue