• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

c-ares / c-ares
92%

Build:
DEFAULT BRANCH: main
Repo Added 01 Nov 2021 07:55PM UTC
Files 177
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH main
branch: main
CHANGE BRANCH
x
Reset
  • main
  • 1.34.6
  • 1.34.6-security
  • HEAD
  • adig
  • adig-ahost-exitcode
  • alpine-clang-19
  • array-size-overflow
  • autotools-update
  • b-mac-gcc
  • bagder/manpage-references
  • bagder/qnx
  • bhouse.qnx
  • bhouse.sonarcloud
  • bhouse.sonarcloud-2
  • ci-fixes
  • copyright
  • coverity_scan
  • dns-name-255-limit-parser
  • dns-validate-rr-counts
  • dohpath
  • fix-ares-dns-record-duplicate-docs
  • fix-ares_send-docs
  • fix-bind
  • fix-buf-ensure-overflow
  • fix-doc-typo
  • fix-inet-pton
  • fix-set-socket-callback
  • fix-setvbuf
  • fix-sortlist
  • fix/binstr-memleak
  • fix/buf-replace-null
  • fix/cookie-logic-bugs
  • fix/corrupt-addrinfo-nodes
  • fix/error-path-memory-leaks
  • fix/hash-idx-parens
  • fix/htable-dict-keys-leak
  • fix/htable-dict-memleak
  • fix/htable-malloc-zero
  • fix/ifa-netmask-null
  • fix/init-read-bytes
  • fix/llist-array-bugs
  • fix/multistring-buf-leak
  • fix/qcache-entry-memleak
  • fix/qnx-confstr-sizeof
  • fix/raw-rr-tostr
  • fix/raw-rr-zero-length
  • fix/unregister-wait-uaf
  • fix/usec-overflow
  • fix/win-sysconfig-null
  • fix/win32-iocp-null
  • fixci
  • fixwin
  • fuzzer_policy
  • hesiod
  • ignore_configchg_init_failures
  • issue-993
  • leaks
  • live-failures
  • localhost
  • macios
  • memory
  • memory-leaks
  • more-const
  • more-record-types
  • newer_cmake
  • ntp-license
  • pkgconfig
  • punycode
  • qnx
  • qnx-config
  • qnx-tests
  • refs/tags/v1.33.0
  • refs/tags/v1.33.1
  • refs/tags/v1.34.0
  • refs/tags/v1.34.1
  • refs/tags/v1.34.2
  • refs/tags/v1.34.3
  • refs/tags/v1.34.4
  • refs/tags/v1.34.5
  • refs/tags/v1.34.6
  • release-1.34.4
  • rnd-xor
  • server-rise-fall
  • service-strtoul-fix
  • size-overflow
  • sockopt
  • staticlib-name
  • tomf/probe-pending
  • typo
  • ubuntu-latest
  • ubuntu-rolling
  • v1.23
  • v1.24
  • v1.25
  • v1.26
  • v1.27
  • v1.28
  • v1.29
  • v1.30
  • v1.31
  • v1.32
  • v1.33
  • v1.34
  • validate-port-parsing
  • wait_on_monotonic
  • win-hosts-path
  • windns-fix
  • winxp
  • winxp-eventloop

12 Apr 2026 06:24PM UTC coverage: 91.687%. Remained the same
24313351165

push

github

web-flow
Fix zero-length RAW_RR losing type metadata during parsing (#1129)

ares_dns_parse_rr_raw_rr() returned early when rdlength==0 without
setting ARES_RR_RAW_RR_TYPE, so the record's type was lost (left as 0).
Move the type assignment to the top of the function so it is set
unconditionally, before the zero-length early return.

Add test with a hand-crafted DNS packet containing a zero-length RAW_RR
with type 65432, verifying the type survives the parse.

---------

Signed-off-by: David Hotham (@dimbleby)

14 of 15 new or added lines in 2 files covered. (93.33%)

6 existing lines in 2 files now uncovered.

22808 of 24876 relevant lines covered (91.69%)

13052.9 hits per line

Relevant lines Covered
Build:
Build:
24876 RELEVANT LINES 22808 COVERED LINES
13052.9 HITS PER LINE
Source Files on main
  • Tree
  • List 177
  • Changed 58
  • Source Changed 0
  • Coverage Changed 58
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
24313351165 main Fix zero-length RAW_RR losing type metadata during parsing (#1129) ares_dns_parse_rr_raw_rr() returned early when rdlength==0 without setting ARES_RR_RAW_RR_TYPE, so the record's type was lost (left as 0). Move the type assignment to the top of t... push 12 Apr 2026 06:34PM UTC web-flow github
91.69
24313314138 main Fix/ifa netmask null (#1120) The first commit handles the possibility that `ifa->ifa_netmask` is null, by defaulting netmask to zero. Then I got worried about whether that was a good default - and discovered that no caller ever asks for the netm... push 12 Apr 2026 06:25PM UTC web-flow github
91.69
24313282876 main validate RR counts before preallocation to reject malformed packets early (#1134) ## Summary Validate DNS RR counts before preallocation to reject malformed packets early. ## What’s the issue? The parser currently trusts RR counts from the DNS... push 12 Apr 2026 06:24PM UTC web-flow github
91.71
24307852195 main Fix RAW_RR type tostr/fromstr roundtrip mismatch (#1123) ares_dns_rec_type_tostr() returned "RAWRR" but ares_dns_rec_type_fromstr() expected "RAW_RR", so a roundtrip through tostr then fromstr would fail. Fix tostr to return "RAW_RR" to match the... push 12 Apr 2026 01:46PM UTC web-flow github
91.7
24307808057 main adig: fix negated option prefix parsing (#1135) Fixed issue: `adig nosig.example.com` yields host "sig.example.com". Signed-off-by: @lifenjoiner push 12 Apr 2026 01:33PM UTC web-flow github
91.7
24307391077 main fix: use UnregisterWaitEx to prevent use-after-free on Win32 (#1111) UnregisterWait() does not guarantee the callback has finished executing on a threadpool thread. If the callback is still running when ares_free(configchg) executes, it dereferen... push 12 Apr 2026 01:10PM UTC web-flow github
91.7
24307364006 main fix: add NULL check after ares_malloc_zero in Windows UTF8 conversion (#1121) In the Windows registry reading path, ares_malloc_zero() result at line 120 was passed directly to WideCharToMultiByte() without a NULL check. On OOM, this causes a NUL... push 12 Apr 2026 01:04PM UTC web-flow github
91.7
24307329566 main Fix microsecond overflow in ares_queue_wait_empty timeout (#1122) When computing the deadline in ares_queue_wait_empty(), the millisecond-to-microsecond addition could cause tout.usec to exceed 1,000,000 if ares_tvnow() returned a non-zero usec c... push 12 Apr 2026 01:03PM UTC web-flow github
91.69
24307276293 main Fix NULL dereference in ares_buf_replace() on NULL buf (#1124) ares_buf_replace() dereferences buf without checking for NULL first, unlike every other function in ares_buf.c. Add buf == NULL to the existing validation guard. Add test case verifyi... push 12 Apr 2026 12:59PM UTC web-flow github
91.69
24307262655 main fix: initialize *read_bytes in ares_socket_recvfrom() (#1125) ares_socket_recv() initializes *read_bytes = 0 at the top, but the sibling function ares_socket_recvfrom() does not. When a 0-byte UDP packet arrives (rv == 0), SUCCESS is returned but... push 12 Apr 2026 12:59PM UTC web-flow github
91.69
See All Builds (2030)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc