Commit b5b819b4 authored by p_himanshu's avatar p_himanshu

Adding a check to avoid undefined behavior if socket is out of the bounds of FD_SETSIZE.

parent 821e2b3a
......@@ -1060,7 +1060,7 @@ static void ns_handle_udp(struct ns_connection *ls) {
}
static void ns_add_to_set(sock_t sock, fd_set *set, sock_t *max_fd) {
if (sock != INVALID_SOCKET) {
if ( (sock != INVALID_SOCKET) && (sock >= 0) && (sock < FD_SETSIZE) ) {
FD_SET(sock, set);
if (*max_fd == INVALID_SOCKET || sock > *max_fd) {
*max_fd = sock;
......@@ -1971,6 +1971,8 @@ struct threadparam {
};
static int wait_until_ready(sock_t sock, int for_read) {
if ( (sock < 0) || (sock >= FD_SETSIZE) )
return 0;
fd_set set;
FD_ZERO(&set);
FD_SET(sock, &set);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment