If decode_prefix6() returns a negative number, don't print buf. 01/211901/1 accepted/tizen/unified/20190813.082335 submit/tizen/20190812.223549
authorSeonah Moon <seonah1.moon@samsung.com>
Mon, 12 Aug 2019 02:03:14 +0000 (11:03 +0900)
committerSeonah Moon <seonah1.moon@samsung.com>
Mon, 12 Aug 2019 02:03:17 +0000 (11:03 +0900)
commitd722eee76c51a65c5449806c6fdacf2ac4f95055
tree9f2fbbaf20c566e7366430088b18f621f8a94522
parent39bf9a556d721ee33c9e534de77ecd99e8e5bd04
If decode_prefix6() returns a negative number, don't print buf.

If it returns a negative number, it hasn't necessarily filled in buf, so
just return immediately; this is similar to the IPv4 code path, wherein
we just return a negative number, and print nothing, on an error.

This should fix GitHub issue #763.

CVE-2018-19519, CVE-2019-1010220
https://github.com/the-tcpdump-group/tcpdump/commit/511915bef7e4de2f31b8d9f581b4a44b0cfbcf53

Change-Id: I50c0b4bc2254917b19f5e1432a8242cb76a72237
print-hncp.c