Blame SOURCES/0031-curl-7.29.0-CVE-2015-3143.patch

92baa4
From a4c6f86f94e7b86026770e8b9da034daf514e5bc Mon Sep 17 00:00:00 2001
92baa4
From: Daniel Stenberg <daniel@haxx.se>
92baa4
Date: Thu, 16 Apr 2015 13:26:46 +0200
92baa4
Subject: [PATCH] ConnectionExists: for NTLM re-use, require credentials to
92baa4
 match
92baa4
92baa4
CVE-2015-3143
92baa4
92baa4
Bug: http://curl.haxx.se/docs/adv_20150422A.html
92baa4
Reported-by: Paras Sethia
92baa4
92baa4
Upstream-commit: 31be461c6b659312100c47be6ddd5f0f569290f6
92baa4
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
92baa4
---
92baa4
 lib/url.c | 2 +-
92baa4
 1 file changed, 1 insertion(+), 1 deletion(-)
92baa4
92baa4
diff --git a/lib/url.c b/lib/url.c
92baa4
index 22e3856..2dc56ae 100644
92baa4
--- a/lib/url.c
92baa4
+++ b/lib/url.c
92baa4
@@ -2973,7 +2973,7 @@ ConnectionExists(struct SessionHandle *data,
92baa4
             }
92baa4
           }
92baa4
           if((!(needle->handler->flags & PROTOPT_CREDSPERREQUEST)) ||
92baa4
-             ((needle->handler->protocol & CURLPROTO_HTTP) && wantNTLM)) {
92baa4
+             (wantNTLM || check->ntlm.state != NTLMSTATE_NONE)) {
a2d4e1
             /* This proto requires credentials per connection or is HTTP+NTLM,
92baa4
                so verify that we're using the same name and password as well */
92baa4
             if(!strequal(needle->user, check->user) ||
92baa4
-- 
92baa4
2.3.6
92baa4