Blame SOURCES/0055-curl-7.29.0-CVE-2017-1000257.patch

9d7d3f
From f8b7620e0578ef44e8fd958d32f348b535d1ab77 Mon Sep 17 00:00:00 2001
9d7d3f
From: Daniel Stenberg <daniel@haxx.se>
9d7d3f
Date: Sat, 7 Oct 2017 00:11:31 +0200
9d7d3f
Subject: [PATCH] imap: if a FETCH response has no size, don't call write
9d7d3f
 callback
9d7d3f
9d7d3f
CVE-2017-1000257
9d7d3f
9d7d3f
Reported-by: Brian Carpenter and 0xd34db347
9d7d3f
Also detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=3586
9d7d3f
9d7d3f
Upstream-commit: 13c9a9ded3ae744a1e11cbc14e9146d9fa427040
9d7d3f
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
9d7d3f
---
9d7d3f
 lib/imap.c | 5 +++++
9d7d3f
 1 file changed, 5 insertions(+)
9d7d3f
9d7d3f
diff --git a/lib/imap.c b/lib/imap.c
9d7d3f
index 48af290..4deba88 100644
9d7d3f
--- a/lib/imap.c
9d7d3f
+++ b/lib/imap.c
9d7d3f
@@ -1137,6 +1137,11 @@ static CURLcode imap_state_fetch_resp(struct connectdata *conn, int imapcode,
9d7d3f
         /* the conversion from curl_off_t to size_t is always fine here */
9d7d3f
         chunk = (size_t)filesize;
9d7d3f
 
9d7d3f
+      if(!chunk) {
9d7d3f
+        /* no size, we're done with the data */
9d7d3f
+        state(conn, IMAP_STOP);
9d7d3f
+        return CURLE_OK;
9d7d3f
+      }
9d7d3f
       result = Curl_client_write(conn, CLIENTWRITE_BODY, pp->cache, chunk);
9d7d3f
       if(result)
9d7d3f
         return result;
9d7d3f
-- 
9d7d3f
2.13.6
9d7d3f