Blame SOURCES/0031-curl-7.29.0-CVE-2015-3143.patch

9d7d3f
From a4c6f86f94e7b86026770e8b9da034daf514e5bc Mon Sep 17 00:00:00 2001
9d7d3f
From: Daniel Stenberg <daniel@haxx.se>
9d7d3f
Date: Thu, 16 Apr 2015 13:26:46 +0200
9d7d3f
Subject: [PATCH] ConnectionExists: for NTLM re-use, require credentials to
9d7d3f
 match
9d7d3f
9d7d3f
CVE-2015-3143
9d7d3f
9d7d3f
Bug: http://curl.haxx.se/docs/adv_20150422A.html
9d7d3f
Reported-by: Paras Sethia
9d7d3f
9d7d3f
Upstream-commit: 31be461c6b659312100c47be6ddd5f0f569290f6
9d7d3f
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
9d7d3f
---
9d7d3f
 lib/url.c | 2 +-
9d7d3f
 1 file changed, 1 insertion(+), 1 deletion(-)
9d7d3f
9d7d3f
diff --git a/lib/url.c b/lib/url.c
9d7d3f
index 22e3856..2dc56ae 100644
9d7d3f
--- a/lib/url.c
9d7d3f
+++ b/lib/url.c
9d7d3f
@@ -2973,7 +2973,7 @@ ConnectionExists(struct SessionHandle *data,
9d7d3f
             }
9d7d3f
           }
9d7d3f
           if((!(needle->handler->flags & PROTOPT_CREDSPERREQUEST)) ||
9d7d3f
-             ((needle->handler->protocol & CURLPROTO_HTTP) && wantNTLM)) {
9d7d3f
+             (wantNTLM || check->ntlm.state != NTLMSTATE_NONE)) {
9d7d3f
             /* This proto requires credentials per connection or is HTTP+NTLM,
9d7d3f
                so verify that we're using the same name and password as well */
9d7d3f
             if(!strequal(needle->user, check->user) ||
9d7d3f
-- 
9d7d3f
2.3.6
9d7d3f