Blame SOURCES/0055-curl-7.29.0-CVE-2017-1000257.patch

aae588
From f8b7620e0578ef44e8fd958d32f348b535d1ab77 Mon Sep 17 00:00:00 2001
aae588
From: Daniel Stenberg <daniel@haxx.se>
aae588
Date: Sat, 7 Oct 2017 00:11:31 +0200
aae588
Subject: [PATCH] imap: if a FETCH response has no size, don't call write
aae588
 callback
aae588
aae588
CVE-2017-1000257
aae588
aae588
Reported-by: Brian Carpenter and 0xd34db347
aae588
Also detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3586
aae588
aae588
Upstream-commit: 13c9a9ded3ae744a1e11cbc14e9146d9fa427040
aae588
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
aae588
---
aae588
 lib/imap.c | 5 +++++
aae588
 1 file changed, 5 insertions(+)
aae588
aae588
diff --git a/lib/imap.c b/lib/imap.c
aae588
index 48af290..4deba88 100644
aae588
--- a/lib/imap.c
aae588
+++ b/lib/imap.c
aae588
@@ -1137,6 +1137,11 @@ static CURLcode imap_state_fetch_resp(struct connectdata *conn, int imapcode,
aae588
         /* the conversion from curl_off_t to size_t is always fine here */
aae588
         chunk = (size_t)filesize;
aae588
 
aae588
+      if(!chunk) {
aae588
+        /* no size, we're done with the data */
aae588
+        state(conn, IMAP_STOP);
aae588
+        return CURLE_OK;
aae588
+      }
aae588
       result = Curl_client_write(conn, CLIENTWRITE_BODY, pp->cache, chunk);
aae588
       if(result)
aae588
         return result;
aae588
-- 
aae588
2.13.6
aae588