Blame SOURCES/0055-curl-7.29.0-CVE-2017-1000257.patch
|
|
aae588 |
From f8b7620e0578ef44e8fd958d32f348b535d1ab77 Mon Sep 17 00:00:00 2001
|
|
|
aae588 |
From: Daniel Stenberg <daniel@haxx.se>
|
|
|
aae588 |
Date: Sat, 7 Oct 2017 00:11:31 +0200
|
|
|
aae588 |
Subject: [PATCH] imap: if a FETCH response has no size, don't call write
|
|
|
aae588 |
callback
|
|
|
aae588 |
|
|
|
aae588 |
CVE-2017-1000257
|
|
|
aae588 |
|
|
|
aae588 |
Reported-by: Brian Carpenter and 0xd34db347
|
|
|
aae588 |
Also detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3586
|
|
|
aae588 |
|
|
|
aae588 |
Upstream-commit: 13c9a9ded3ae744a1e11cbc14e9146d9fa427040
|
|
|
aae588 |
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
|
|
|
aae588 |
---
|
|
|
aae588 |
lib/imap.c | 5 +++++
|
|
|
aae588 |
1 file changed, 5 insertions(+)
|
|
|
aae588 |
|
|
|
aae588 |
diff --git a/lib/imap.c b/lib/imap.c
|
|
|
aae588 |
index 48af290..4deba88 100644
|
|
|
aae588 |
--- a/lib/imap.c
|
|
|
aae588 |
+++ b/lib/imap.c
|
|
|
aae588 |
@@ -1137,6 +1137,11 @@ static CURLcode imap_state_fetch_resp(struct connectdata *conn, int imapcode,
|
|
|
aae588 |
/* the conversion from curl_off_t to size_t is always fine here */
|
|
|
aae588 |
chunk = (size_t)filesize;
|
|
|
aae588 |
|
|
|
aae588 |
+ if(!chunk) {
|
|
|
aae588 |
+ /* no size, we're done with the data */
|
|
|
aae588 |
+ state(conn, IMAP_STOP);
|
|
|
aae588 |
+ return CURLE_OK;
|
|
|
aae588 |
+ }
|
|
|
aae588 |
result = Curl_client_write(conn, CLIENTWRITE_BODY, pp->cache, chunk);
|
|
|
aae588 |
if(result)
|
|
|
aae588 |
return result;
|
|
|
aae588 |
--
|
|
|
aae588 |
2.13.6
|
|
|
aae588 |
|