The Austin group has clarified in
  <http://www.opengroup.org/austin/docs/austin_454.txt>
the specification of memchr:

  "Implementations shall behave as if they read the memory byte by byte
   from the beginning of the bytes pointed to by s and stop at the first
   occurrence of c."

So passing a too large size to memchr() is ok. The bug in is memchr().

Bruno



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to