Initialize for curl
This commit is contained in:
commit
b5ad3e087f
22 changed files with 7432 additions and 0 deletions
1
.curl.metadata
Normal file
1
.curl.metadata
Normal file
|
@ -0,0 +1 @@
|
|||
ddefb3e4436e67987d452e0da9ddc267f4f7a62fe1bc4b2bbd5ea5d96ded0480 curl-8.0.1.tar.xz
|
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
|
@ -0,0 +1 @@
|
|||
curl-8.0.1.tar.xz
|
6
baselibs.conf
Normal file
6
baselibs.conf
Normal file
|
@ -0,0 +1,6 @@
|
|||
libcurl4
|
||||
obsoletes "curl-<targettype> <= <version>"
|
||||
provides "curl-<targettype> = <version>"
|
||||
libcurl-devel
|
||||
requires -curl-<targettype>
|
||||
requires "libcurl4-<targettype> = <version>"
|
11
curl-8.0.1.tar.xz.asc
Normal file
11
curl-8.0.1.tar.xz.asc
Normal file
|
@ -0,0 +1,11 @@
|
|||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQEzBAABCgAdFiEEJ+3q8i86vOtQ25oSXMkI/bceEsIFAmQYZbIACgkQXMkI/bce
|
||||
EsIBhQf/WBWHXCc2+NoyjY/AOO0iGhx6ulp1u57AzDCiIpBSbzJYfk6LpmlUcAo+
|
||||
urAje0GbgTBIjs4oG+Hnr8nSqo05TWuQK43g/4BFcFv3Q8aFX2w3i6x/at9zKULy
|
||||
yRTAvhyhTXcJsZR+MKWHltHhiO5g/d4P46+OBG7f1sY93ztBiFLdrZhMu5v27RjX
|
||||
G8sgysXDzZP/VEGEuQsRPNjlQPMsO3ZyOCcUsj+L6u1nWW2Ru1c/7vvGzZtQEONi
|
||||
fB3X2dX2QUdG7vR1t02aFgjzws01TmBvN0XW2EbDT36IEtngTGlgIXMWGcXQlVyG
|
||||
6J0DqzOrXntl6HTLHIfHAorrzWvV3A==
|
||||
=mEwS
|
||||
-----END PGP SIGNATURE-----
|
28
curl-CVE-2023-28319.patch
Normal file
28
curl-CVE-2023-28319.patch
Normal file
|
@ -0,0 +1,28 @@
|
|||
From 8e21b1a05f3c0ee098dbcb6c3d84cb61f102a122 Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Mon, 8 May 2023 14:33:54 +0200
|
||||
Subject: [PATCH] libssh2: free fingerprint better
|
||||
|
||||
Reported-by: Wei Chong Tan
|
||||
Closes #11088
|
||||
---
|
||||
lib/vssh/libssh2.c | 3 +--
|
||||
1 file changed, 1 insertion(+), 2 deletions(-)
|
||||
|
||||
diff --git a/lib/vssh/libssh2.c b/lib/vssh/libssh2.c
|
||||
index bfcc94e160178..dd39a844c646b 100644
|
||||
--- a/lib/vssh/libssh2.c
|
||||
+++ b/lib/vssh/libssh2.c
|
||||
@@ -728,11 +728,10 @@ static CURLcode ssh_check_fingerprint(struct Curl_easy *data)
|
||||
*/
|
||||
if((pub_pos != b64_pos) ||
|
||||
strncmp(fingerprint_b64, pubkey_sha256, pub_pos)) {
|
||||
- free(fingerprint_b64);
|
||||
-
|
||||
failf(data,
|
||||
"Denied establishing ssh session: mismatch sha256 fingerprint. "
|
||||
"Remote %s is not equal to %s", fingerprint_b64, pubkey_sha256);
|
||||
+ free(fingerprint_b64);
|
||||
state(data, SSH_SESSION_FREE);
|
||||
sshc->actualcode = CURLE_PEER_FAILED_VERIFICATION;
|
||||
return sshc->actualcode;
|
79
curl-CVE-2023-28320.patch
Normal file
79
curl-CVE-2023-28320.patch
Normal file
|
@ -0,0 +1,79 @@
|
|||
From 13718030ad4b3209a7583b4f27f683cd3a6fa5f2 Mon Sep 17 00:00:00 2001
|
||||
From: Harry Sintonen <sintonen@iki.fi>
|
||||
Date: Tue, 25 Apr 2023 09:22:26 +0200
|
||||
Subject: [PATCH] hostip: add locks around use of global buffer for alarm()
|
||||
|
||||
When building with the sync name resolver and timeout ability we now
|
||||
require thread-safety to be present to enable it.
|
||||
|
||||
Closes #11030
|
||||
---
|
||||
lib/hostip.c | 19 +++++++++++++++----
|
||||
1 file changed, 15 insertions(+), 4 deletions(-)
|
||||
|
||||
diff --git a/lib/hostip.c b/lib/hostip.c
|
||||
index 2381290fdd43e..e410cda69ae6e 100644
|
||||
--- a/lib/hostip.c
|
||||
+++ b/lib/hostip.c
|
||||
@@ -70,12 +70,19 @@
|
||||
#include <SystemConfiguration/SCDynamicStoreCopySpecific.h>
|
||||
#endif
|
||||
|
||||
-#if defined(CURLRES_SYNCH) && \
|
||||
- defined(HAVE_ALARM) && defined(SIGALRM) && defined(HAVE_SIGSETJMP)
|
||||
+#if defined(CURLRES_SYNCH) && \
|
||||
+ defined(HAVE_ALARM) && \
|
||||
+ defined(SIGALRM) && \
|
||||
+ defined(HAVE_SIGSETJMP) && \
|
||||
+ defined(GLOBAL_INIT_IS_THREADSAFE)
|
||||
/* alarm-based timeouts can only be used with all the dependencies satisfied */
|
||||
#define USE_ALARM_TIMEOUT
|
||||
#endif
|
||||
|
||||
+#ifdef USE_ALARM_TIMEOUT
|
||||
+#include "easy_lock.h"
|
||||
+#endif
|
||||
+
|
||||
#define MAX_HOSTCACHE_LEN (255 + 7) /* max FQDN + colon + port number + zero */
|
||||
|
||||
/*
|
||||
@@ -254,11 +261,12 @@ void Curl_hostcache_prune(struct Curl_easy *data)
|
||||
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
||||
}
|
||||
|
||||
-#ifdef HAVE_SIGSETJMP
|
||||
+#ifdef USE_ALARM_TIMEOUT
|
||||
/* Beware this is a global and unique instance. This is used to store the
|
||||
return address that we can jump back to from inside a signal handler. This
|
||||
is not thread-safe stuff. */
|
||||
sigjmp_buf curl_jmpenv;
|
||||
+curl_simple_lock curl_jmpenv_lock;
|
||||
#endif
|
||||
|
||||
/* lookup address, returns entry if found and not stale */
|
||||
@@ -832,7 +840,6 @@ enum resolve_t Curl_resolv(struct Curl_easy *data,
|
||||
static
|
||||
void alarmfunc(int sig)
|
||||
{
|
||||
- /* this is for "-ansi -Wall -pedantic" to stop complaining! (rabe) */
|
||||
(void)sig;
|
||||
siglongjmp(curl_jmpenv, 1);
|
||||
}
|
||||
@@ -912,6 +919,8 @@ enum resolve_t Curl_resolv_timeout(struct Curl_easy *data,
|
||||
This should be the last thing we do before calling Curl_resolv(),
|
||||
as otherwise we'd have to worry about variables that get modified
|
||||
before we invoke Curl_resolv() (and thus use "volatile"). */
|
||||
+ curl_simple_lock_lock(&curl_jmpenv_lock);
|
||||
+
|
||||
if(sigsetjmp(curl_jmpenv, 1)) {
|
||||
/* this is coming from a siglongjmp() after an alarm signal */
|
||||
failf(data, "name lookup timed out");
|
||||
@@ -980,6 +989,8 @@ enum resolve_t Curl_resolv_timeout(struct Curl_easy *data,
|
||||
#endif
|
||||
#endif /* HAVE_SIGACTION */
|
||||
|
||||
+ curl_simple_lock_unlock(&curl_jmpenv_lock);
|
||||
+
|
||||
/* switch back the alarm() to either zero or to what it was before minus
|
||||
the time we spent until now! */
|
||||
if(prev_alarm) {
|
487
curl-CVE-2023-28321.patch
Normal file
487
curl-CVE-2023-28321.patch
Normal file
|
@ -0,0 +1,487 @@
|
|||
From 199f2d440d8659b42670c1b796220792b01a97bf Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Mon, 24 Apr 2023 21:07:02 +0200
|
||||
Subject: [PATCH] hostcheck: fix host name wildcard checking
|
||||
|
||||
The leftmost "label" of the host name can now only match against single
|
||||
'*'. Like the browsers have worked for a long time.
|
||||
|
||||
- extended unit test 1397 for this
|
||||
- move some SOURCE variables from unit/Makefile.am to unit/Makefile.inc
|
||||
|
||||
Reported-by: Hiroki Kurosawa
|
||||
Closes #11018
|
||||
---
|
||||
lib/vtls/hostcheck.c | 50 +++++++--------
|
||||
tests/data/test1397 | 10 ++-
|
||||
tests/unit/Makefile.am | 94 ----------------------------
|
||||
tests/unit/Makefile.inc | 94 ++++++++++++++++++++++++++++
|
||||
tests/unit/unit1397.c | 134 ++++++++++++++++++++++++----------------
|
||||
5 files changed, 202 insertions(+), 180 deletions(-)
|
||||
|
||||
Index: curl-8.0.1/lib/vtls/hostcheck.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/vtls/hostcheck.c
|
||||
+++ curl-8.0.1/lib/vtls/hostcheck.c
|
||||
@@ -71,7 +71,12 @@ static bool pmatch(const char *hostname,
|
||||
* apparent distinction between a name and an IP. We need to detect the use of
|
||||
* an IP address and not wildcard match on such names.
|
||||
*
|
||||
+ * Only match on "*" being used for the leftmost label, not "a*", "a*b" nor
|
||||
+ * "*b".
|
||||
+ *
|
||||
* Return TRUE on a match. FALSE if not.
|
||||
+ *
|
||||
+ * @unittest: 1397
|
||||
*/
|
||||
|
||||
static bool hostmatch(const char *hostname,
|
||||
@@ -79,53 +84,42 @@ static bool hostmatch(const char *hostna
|
||||
const char *pattern,
|
||||
size_t patternlen)
|
||||
{
|
||||
- const char *pattern_label_end, *wildcard, *hostname_label_end;
|
||||
- size_t prefixlen, suffixlen;
|
||||
+ const char *pattern_label_end;
|
||||
|
||||
- /* normalize pattern and hostname by stripping off trailing dots */
|
||||
+ DEBUGASSERT(pattern);
|
||||
DEBUGASSERT(patternlen);
|
||||
+ DEBUGASSERT(hostname);
|
||||
+ DEBUGASSERT(hostlen);
|
||||
+
|
||||
+ /* normalize pattern and hostname by stripping off trailing dots */
|
||||
if(hostname[hostlen-1]=='.')
|
||||
hostlen--;
|
||||
if(pattern[patternlen-1]=='.')
|
||||
patternlen--;
|
||||
|
||||
- wildcard = memchr(pattern, '*', patternlen);
|
||||
- if(!wildcard)
|
||||
+ if(strncmp(pattern, "*.", 2))
|
||||
return pmatch(hostname, hostlen, pattern, patternlen);
|
||||
|
||||
/* detect IP address as hostname and fail the match if so */
|
||||
- if(Curl_host_is_ipnum(hostname))
|
||||
+ else if(Curl_host_is_ipnum(hostname))
|
||||
return FALSE;
|
||||
|
||||
/* We require at least 2 dots in the pattern to avoid too wide wildcard
|
||||
match. */
|
||||
pattern_label_end = memchr(pattern, '.', patternlen);
|
||||
if(!pattern_label_end ||
|
||||
- (memrchr(pattern, '.', patternlen) == pattern_label_end) ||
|
||||
- strncasecompare(pattern, "xn--", 4))
|
||||
+ (memrchr(pattern, '.', patternlen) == pattern_label_end))
|
||||
return pmatch(hostname, hostlen, pattern, patternlen);
|
||||
-
|
||||
- hostname_label_end = memchr(hostname, '.', hostlen);
|
||||
- if(!hostname_label_end)
|
||||
- return FALSE;
|
||||
else {
|
||||
- size_t skiphost = hostname_label_end - hostname;
|
||||
- size_t skiplen = pattern_label_end - pattern;
|
||||
- if(!pmatch(hostname_label_end, hostlen - skiphost,
|
||||
- pattern_label_end, patternlen - skiplen))
|
||||
- return FALSE;
|
||||
+ const char *hostname_label_end = memchr(hostname, '.', hostlen);
|
||||
+ if(hostname_label_end) {
|
||||
+ size_t skiphost = hostname_label_end - hostname;
|
||||
+ size_t skiplen = pattern_label_end - pattern;
|
||||
+ return pmatch(hostname_label_end, hostlen - skiphost,
|
||||
+ pattern_label_end, patternlen - skiplen);
|
||||
+ }
|
||||
}
|
||||
- /* The wildcard must match at least one character, so the left-most
|
||||
- label of the hostname is at least as large as the left-most label
|
||||
- of the pattern. */
|
||||
- if(hostname_label_end - hostname < pattern_label_end - pattern)
|
||||
- return FALSE;
|
||||
-
|
||||
- prefixlen = wildcard - pattern;
|
||||
- suffixlen = pattern_label_end - (wildcard + 1);
|
||||
- return strncasecompare(pattern, hostname, prefixlen) &&
|
||||
- strncasecompare(wildcard + 1, hostname_label_end - suffixlen,
|
||||
- suffixlen) ? TRUE : FALSE;
|
||||
+ return FALSE;
|
||||
}
|
||||
|
||||
/*
|
||||
Index: curl-8.0.1/tests/data/test1397
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/tests/data/test1397
|
||||
+++ curl-8.0.1/tests/data/test1397
|
||||
@@ -2,8 +2,7 @@
|
||||
<info>
|
||||
<keywords>
|
||||
unittest
|
||||
-ssl
|
||||
-wildcard
|
||||
+Curl_cert_hostcheck
|
||||
</keywords>
|
||||
</info>
|
||||
|
||||
@@ -16,9 +15,8 @@ none
|
||||
<features>
|
||||
unittest
|
||||
</features>
|
||||
- <name>
|
||||
-Check wildcard certificate matching function Curl_cert_hostcheck
|
||||
- </name>
|
||||
+<name>
|
||||
+Curl_cert_hostcheck unit tests
|
||||
+</name>
|
||||
</client>
|
||||
-
|
||||
</testcase>
|
||||
Index: curl-8.0.1/tests/unit/Makefile.am
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/tests/unit/Makefile.am
|
||||
+++ curl-8.0.1/tests/unit/Makefile.am
|
||||
@@ -67,91 +67,3 @@ noinst_PROGRAMS = $(UNITPROGS)
|
||||
else
|
||||
noinst_PROGRAMS =
|
||||
endif
|
||||
-
|
||||
-unit1300_SOURCES = unit1300.c $(UNITFILES)
|
||||
-
|
||||
-unit1302_SOURCES = unit1302.c $(UNITFILES)
|
||||
-
|
||||
-unit1303_SOURCES = unit1303.c $(UNITFILES)
|
||||
-
|
||||
-unit1304_SOURCES = unit1304.c $(UNITFILES)
|
||||
-
|
||||
-unit1305_SOURCES = unit1305.c $(UNITFILES)
|
||||
-
|
||||
-unit1307_SOURCES = unit1307.c $(UNITFILES)
|
||||
-
|
||||
-unit1308_SOURCES = unit1308.c $(UNITFILES)
|
||||
-
|
||||
-unit1309_SOURCES = unit1309.c $(UNITFILES)
|
||||
-
|
||||
-unit1323_SOURCES = unit1323.c $(UNITFILES)
|
||||
-
|
||||
-unit1330_SOURCES = unit1330.c $(UNITFILES)
|
||||
-
|
||||
-unit1394_SOURCES = unit1394.c $(UNITFILES)
|
||||
-unit1394_LDADD = $(top_builddir)/lib/libcurl.la @LIBCURL_LIBS@
|
||||
-unit1394_LDFLAGS = $(top_builddir)/src/libcurltool.la
|
||||
-unit1394_LIBS =
|
||||
-
|
||||
-unit1395_SOURCES = unit1395.c $(UNITFILES)
|
||||
-
|
||||
-unit1396_SOURCES = unit1396.c $(UNITFILES)
|
||||
-
|
||||
-unit1397_SOURCES = unit1397.c $(UNITFILES)
|
||||
-
|
||||
-unit1398_SOURCES = unit1398.c $(UNITFILES)
|
||||
-
|
||||
-unit1399_SOURCES = unit1399.c $(UNITFILES)
|
||||
-
|
||||
-unit1600_SOURCES = unit1600.c $(UNITFILES)
|
||||
-
|
||||
-unit1601_SOURCES = unit1601.c $(UNITFILES)
|
||||
-
|
||||
-unit1602_SOURCES = unit1602.c $(UNITFILES)
|
||||
-
|
||||
-unit1603_SOURCES = unit1603.c $(UNITFILES)
|
||||
-
|
||||
-unit1604_SOURCES = unit1604.c $(UNITFILES)
|
||||
-
|
||||
-unit1605_SOURCES = unit1605.c $(UNITFILES)
|
||||
-
|
||||
-unit1606_SOURCES = unit1606.c $(UNITFILES)
|
||||
-
|
||||
-unit1607_SOURCES = unit1607.c $(UNITFILES)
|
||||
-
|
||||
-unit1608_SOURCES = unit1608.c $(UNITFILES)
|
||||
-
|
||||
-unit1609_SOURCES = unit1609.c $(UNITFILES)
|
||||
-
|
||||
-unit1610_SOURCES = unit1610.c $(UNITFILES)
|
||||
-
|
||||
-unit1611_SOURCES = unit1611.c $(UNITFILES)
|
||||
-
|
||||
-unit1612_SOURCES = unit1612.c $(UNITFILES)
|
||||
-
|
||||
-unit1614_SOURCES = unit1614.c $(UNITFILES)
|
||||
-
|
||||
-unit1620_SOURCES = unit1620.c $(UNITFILES)
|
||||
-
|
||||
-unit1621_SOURCES = unit1621.c $(UNITFILES)
|
||||
-unit1621_LDADD = $(top_builddir)/src/libcurltool.la $(top_builddir)/lib/libcurl.la @NSS_LIBS@
|
||||
-
|
||||
-unit1650_SOURCES = unit1650.c $(UNITFILES)
|
||||
-
|
||||
-unit1651_SOURCES = unit1651.c $(UNITFILES)
|
||||
-
|
||||
-unit1652_SOURCES = unit1652.c $(UNITFILES)
|
||||
-
|
||||
-unit1653_SOURCES = unit1653.c $(UNITFILES)
|
||||
-
|
||||
-unit1654_SOURCES = unit1654.c $(UNITFILES)
|
||||
-
|
||||
-unit1655_SOURCES = unit1655.c $(UNITFILES)
|
||||
-
|
||||
-unit1660_SOURCES = unit1660.c $(UNITFILES)
|
||||
-
|
||||
-unit1661_SOURCES = unit1661.c $(UNITFILES)
|
||||
-
|
||||
-unit2600_SOURCES = unit2600.c $(UNITFILES)
|
||||
-
|
||||
-unit3200_SOURCES = unit3200.c $(UNITFILES)
|
||||
Index: curl-8.0.1/tests/unit/Makefile.inc
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/tests/unit/Makefile.inc
|
||||
+++ curl-8.0.1/tests/unit/Makefile.inc
|
||||
@@ -40,3 +40,91 @@ UNITPROGS = unit1300 unit1302 u
|
||||
unit1660 unit1661 \
|
||||
unit2600 \
|
||||
unit3200
|
||||
+
|
||||
+unit1300_SOURCES = unit1300.c $(UNITFILES)
|
||||
+
|
||||
+unit1302_SOURCES = unit1302.c $(UNITFILES)
|
||||
+
|
||||
+unit1303_SOURCES = unit1303.c $(UNITFILES)
|
||||
+
|
||||
+unit1304_SOURCES = unit1304.c $(UNITFILES)
|
||||
+
|
||||
+unit1305_SOURCES = unit1305.c $(UNITFILES)
|
||||
+
|
||||
+unit1307_SOURCES = unit1307.c $(UNITFILES)
|
||||
+
|
||||
+unit1308_SOURCES = unit1308.c $(UNITFILES)
|
||||
+
|
||||
+unit1309_SOURCES = unit1309.c $(UNITFILES)
|
||||
+
|
||||
+unit1323_SOURCES = unit1323.c $(UNITFILES)
|
||||
+
|
||||
+unit1330_SOURCES = unit1330.c $(UNITFILES)
|
||||
+
|
||||
+unit1394_SOURCES = unit1394.c $(UNITFILES)
|
||||
+unit1394_LDADD = $(top_builddir)/lib/libcurl.la @LIBCURL_LIBS@
|
||||
+unit1394_LDFLAGS = $(top_builddir)/src/libcurltool.la
|
||||
+unit1394_LIBS =
|
||||
+
|
||||
+unit1395_SOURCES = unit1395.c $(UNITFILES)
|
||||
+
|
||||
+unit1396_SOURCES = unit1396.c $(UNITFILES)
|
||||
+
|
||||
+unit1397_SOURCES = unit1397.c $(UNITFILES)
|
||||
+
|
||||
+unit1398_SOURCES = unit1398.c $(UNITFILES)
|
||||
+
|
||||
+unit1399_SOURCES = unit1399.c $(UNITFILES)
|
||||
+
|
||||
+unit1600_SOURCES = unit1600.c $(UNITFILES)
|
||||
+
|
||||
+unit1601_SOURCES = unit1601.c $(UNITFILES)
|
||||
+
|
||||
+unit1602_SOURCES = unit1602.c $(UNITFILES)
|
||||
+
|
||||
+unit1603_SOURCES = unit1603.c $(UNITFILES)
|
||||
+
|
||||
+unit1604_SOURCES = unit1604.c $(UNITFILES)
|
||||
+
|
||||
+unit1605_SOURCES = unit1605.c $(UNITFILES)
|
||||
+
|
||||
+unit1606_SOURCES = unit1606.c $(UNITFILES)
|
||||
+
|
||||
+unit1607_SOURCES = unit1607.c $(UNITFILES)
|
||||
+
|
||||
+unit1608_SOURCES = unit1608.c $(UNITFILES)
|
||||
+
|
||||
+unit1609_SOURCES = unit1609.c $(UNITFILES)
|
||||
+
|
||||
+unit1610_SOURCES = unit1610.c $(UNITFILES)
|
||||
+
|
||||
+unit1611_SOURCES = unit1611.c $(UNITFILES)
|
||||
+
|
||||
+unit1612_SOURCES = unit1612.c $(UNITFILES)
|
||||
+
|
||||
+unit1614_SOURCES = unit1614.c $(UNITFILES)
|
||||
+
|
||||
+unit1620_SOURCES = unit1620.c $(UNITFILES)
|
||||
+
|
||||
+unit1621_SOURCES = unit1621.c $(UNITFILES)
|
||||
+unit1621_LDADD = $(top_builddir)/src/libcurltool.la $(top_builddir)/lib/libcurl.la @NSS_LIBS@
|
||||
+
|
||||
+unit1650_SOURCES = unit1650.c $(UNITFILES)
|
||||
+
|
||||
+unit1651_SOURCES = unit1651.c $(UNITFILES)
|
||||
+
|
||||
+unit1652_SOURCES = unit1652.c $(UNITFILES)
|
||||
+
|
||||
+unit1653_SOURCES = unit1653.c $(UNITFILES)
|
||||
+
|
||||
+unit1654_SOURCES = unit1654.c $(UNITFILES)
|
||||
+
|
||||
+unit1655_SOURCES = unit1655.c $(UNITFILES)
|
||||
+
|
||||
+unit1660_SOURCES = unit1660.c $(UNITFILES)
|
||||
+
|
||||
+unit1661_SOURCES = unit1661.c $(UNITFILES)
|
||||
+
|
||||
+unit2600_SOURCES = unit2600.c $(UNITFILES)
|
||||
+
|
||||
+unit3200_SOURCES = unit3200.c $(UNITFILES)
|
||||
Index: curl-8.0.1/tests/unit/unit1397.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/tests/unit/unit1397.c
|
||||
+++ curl-8.0.1/tests/unit/unit1397.c
|
||||
@@ -23,7 +23,6 @@
|
||||
***************************************************************************/
|
||||
#include "curlcheck.h"
|
||||
|
||||
-#include "vtls/hostcheck.h" /* from the lib dir */
|
||||
|
||||
static CURLcode unit_setup(void)
|
||||
{
|
||||
@@ -32,63 +31,94 @@ static CURLcode unit_setup(void)
|
||||
|
||||
static void unit_stop(void)
|
||||
{
|
||||
- /* done before shutting down and exiting */
|
||||
}
|
||||
|
||||
-UNITTEST_START
|
||||
-
|
||||
/* only these backends define the tested functions */
|
||||
-#if defined(USE_OPENSSL) || defined(USE_GSKIT)
|
||||
-
|
||||
- /* here you start doing things and checking that the results are good */
|
||||
+#if defined(USE_OPENSSL) || defined(USE_GSKIT) || defined(USE_SCHANNEL)
|
||||
+#include "vtls/hostcheck.h"
|
||||
+struct testcase {
|
||||
+ const char *host;
|
||||
+ const char *pattern;
|
||||
+ bool match;
|
||||
+};
|
||||
+
|
||||
+static struct testcase tests[] = {
|
||||
+ {"", "", FALSE},
|
||||
+ {"a", "", FALSE},
|
||||
+ {"", "b", FALSE},
|
||||
+ {"a", "b", FALSE},
|
||||
+ {"aa", "bb", FALSE},
|
||||
+ {"\xff", "\xff", TRUE},
|
||||
+ {"aa.aa.aa", "aa.aa.bb", FALSE},
|
||||
+ {"aa.aa.aa", "aa.aa.aa", TRUE},
|
||||
+ {"aa.aa.aa", "*.aa.bb", FALSE},
|
||||
+ {"aa.aa.aa", "*.aa.aa", TRUE},
|
||||
+ {"192.168.0.1", "192.168.0.1", TRUE},
|
||||
+ {"192.168.0.1", "*.168.0.1", FALSE},
|
||||
+ {"192.168.0.1", "*.0.1", FALSE},
|
||||
+ {"h.ello", "*.ello", FALSE},
|
||||
+ {"h.ello.", "*.ello", FALSE},
|
||||
+ {"h.ello", "*.ello.", FALSE},
|
||||
+ {"h.e.llo", "*.e.llo", TRUE},
|
||||
+ {"h.e.llo", " *.e.llo", FALSE},
|
||||
+ {" h.e.llo", "*.e.llo", TRUE},
|
||||
+ {"h.e.llo.", "*.e.llo", TRUE},
|
||||
+ {"*.e.llo.", "*.e.llo", TRUE},
|
||||
+ {"************.e.llo.", "*.e.llo", TRUE},
|
||||
+ {"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
||||
+ "BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB"
|
||||
+ "CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
|
||||
+ "DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD"
|
||||
+ "EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE"
|
||||
+ ".e.llo.", "*.e.llo", TRUE},
|
||||
+ {"\xfe\xfe.e.llo.", "*.e.llo", TRUE},
|
||||
+ {"h.e.llo.", "*.e.llo.", TRUE},
|
||||
+ {"h.e.llo", "*.e.llo.", TRUE},
|
||||
+ {".h.e.llo", "*.e.llo.", FALSE},
|
||||
+ {"h.e.llo", "*.*.llo.", FALSE},
|
||||
+ {"h.e.llo", "h.*.llo", FALSE},
|
||||
+ {"h.e.llo", "h.e.*", FALSE},
|
||||
+ {"hello", "*.ello", FALSE},
|
||||
+ {"hello", "**llo", FALSE},
|
||||
+ {"bar.foo.example.com", "*.example.com", FALSE},
|
||||
+ {"foo.example.com", "*.example.com", TRUE},
|
||||
+ {"baz.example.net", "b*z.example.net", FALSE},
|
||||
+ {"foobaz.example.net", "*baz.example.net", FALSE},
|
||||
+ {"xn--l8j.example.local", "x*.example.local", FALSE},
|
||||
+ {"xn--l8j.example.net", "*.example.net", TRUE},
|
||||
+ {"xn--l8j.example.net", "*j.example.net", FALSE},
|
||||
+ {"xn--l8j.example.net", "xn--l8j.example.net", TRUE},
|
||||
+ {"xn--l8j.example.net", "xn--l8j.*.net", FALSE},
|
||||
+ {"xl8j.example.net", "*.example.net", TRUE},
|
||||
+ {"fe80::3285:a9ff:fe46:b619", "*::3285:a9ff:fe46:b619", FALSE},
|
||||
+ {"fe80::3285:a9ff:fe46:b619", "fe80::3285:a9ff:fe46:b619", TRUE},
|
||||
+ {NULL, NULL, FALSE}
|
||||
+};
|
||||
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("www.example.com"),
|
||||
- STRCONST("www.example.com")), "good 1");
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("*.example.com"),
|
||||
- STRCONST("www.example.com")),
|
||||
- "good 2");
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("xxx*.example.com"),
|
||||
- STRCONST("xxxwww.example.com")), "good 3");
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("f*.example.com"),
|
||||
- STRCONST("foo.example.com")), "good 4");
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("192.168.0.0"),
|
||||
- STRCONST("192.168.0.0")), "good 5");
|
||||
-
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("xxx.example.com"),
|
||||
- STRCONST("www.example.com")), "bad 1");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*"),
|
||||
- STRCONST("www.example.com")),"bad 2");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.*.com"),
|
||||
- STRCONST("www.example.com")), "bad 3");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.example.com"),
|
||||
- STRCONST("baa.foo.example.com")), "bad 4");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("f*.example.com"),
|
||||
- STRCONST("baa.example.com")), "bad 5");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.com"),
|
||||
- STRCONST("example.com")), "bad 6");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*fail.com"),
|
||||
- STRCONST("example.com")), "bad 7");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.example."),
|
||||
- STRCONST("www.example.")), "bad 8");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.example."),
|
||||
- STRCONST("www.example")), "bad 9");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST(""), STRCONST("www")), "bad 10");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*"), STRCONST("www")), "bad 11");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*.168.0.0"),
|
||||
- STRCONST("192.168.0.0")), "bad 12");
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("www.example.com"),
|
||||
- STRCONST("192.168.0.0")), "bad 13");
|
||||
-
|
||||
-#ifdef ENABLE_IPV6
|
||||
-fail_if(Curl_cert_hostcheck(STRCONST("*::3285:a9ff:fe46:b619"),
|
||||
- STRCONST("fe80::3285:a9ff:fe46:b619")), "bad 14");
|
||||
-fail_unless(Curl_cert_hostcheck(STRCONST("fe80::3285:a9ff:fe46:b619"),
|
||||
- STRCONST("fe80::3285:a9ff:fe46:b619")),
|
||||
- "good 6");
|
||||
-#endif
|
||||
+UNITTEST_START
|
||||
+{
|
||||
+ int i;
|
||||
+ for(i = 0; tests[i].host; i++) {
|
||||
+ if(tests[i].match != Curl_cert_hostcheck(tests[i].pattern,
|
||||
+ strlen(tests[i].pattern),
|
||||
+ tests[i].host,
|
||||
+ strlen(tests[i].host))) {
|
||||
+ fprintf(stderr,
|
||||
+ "HOST: %s\n"
|
||||
+ "PTRN: %s\n"
|
||||
+ "did %sMATCH\n",
|
||||
+ tests[i].host,
|
||||
+ tests[i].pattern,
|
||||
+ tests[i].match ? "NOT ": "");
|
||||
+ unitfail++;
|
||||
+ }
|
||||
+ }
|
||||
+}
|
||||
|
||||
-#endif
|
||||
+UNITTEST_STOP
|
||||
+#else
|
||||
|
||||
- /* you end the test code like this: */
|
||||
+UNITTEST_START
|
||||
|
||||
UNITTEST_STOP
|
||||
+#endif
|
431
curl-CVE-2023-28322.patch
Normal file
431
curl-CVE-2023-28322.patch
Normal file
|
@ -0,0 +1,431 @@
|
|||
From 7815647d6582c0a4900be2e1de6c5e61272c496b Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Tue, 25 Apr 2023 08:28:01 +0200
|
||||
Subject: [PATCH] lib: unify the upload/method handling
|
||||
|
||||
By making sure we set state.upload based on the set.method value and not
|
||||
independently as set.upload, we reduce confusion and mixup risks, both
|
||||
internally and externally.
|
||||
|
||||
Closes #11017
|
||||
---
|
||||
lib/curl_rtmp.c | 4 ++--
|
||||
lib/file.c | 4 ++--
|
||||
lib/ftp.c | 8 ++++----
|
||||
lib/http.c | 4 ++--
|
||||
lib/imap.c | 6 +++---
|
||||
lib/rtsp.c | 4 ++--
|
||||
lib/setopt.c | 6 ++----
|
||||
lib/smb.c | 6 +++---
|
||||
lib/smtp.c | 4 ++--
|
||||
lib/tftp.c | 8 ++++----
|
||||
lib/transfer.c | 4 ++--
|
||||
lib/urldata.h | 2 +-
|
||||
lib/vssh/libssh.c | 6 +++---
|
||||
lib/vssh/libssh2.c | 6 +++---
|
||||
lib/vssh/wolfssh.c | 2 +-
|
||||
15 files changed, 36 insertions(+), 38 deletions(-)
|
||||
|
||||
diff --git a/lib/curl_rtmp.c b/lib/curl_rtmp.c
|
||||
index 2679a2cdc1afe..406fb42ac0f44 100644
|
||||
--- a/lib/curl_rtmp.c
|
||||
+++ b/lib/curl_rtmp.c
|
||||
@@ -231,7 +231,7 @@ static CURLcode rtmp_connect(struct Curl_easy *data, bool *done)
|
||||
/* We have to know if it's a write before we send the
|
||||
* connect request packet
|
||||
*/
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
r->Link.protocol |= RTMP_FEATURE_WRITE;
|
||||
|
||||
/* For plain streams, use the buffer toggle trick to keep data flowing */
|
||||
@@ -263,7 +263,7 @@ static CURLcode rtmp_do(struct Curl_easy *data, bool *done)
|
||||
if(!RTMP_ConnectStream(r, 0))
|
||||
return CURLE_FAILED_INIT;
|
||||
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
Curl_pgrsSetUploadSize(data, data->state.infilesize);
|
||||
Curl_setup_transfer(data, -1, -1, FALSE, FIRSTSOCKET);
|
||||
}
|
||||
diff --git a/lib/file.c b/lib/file.c
|
||||
index 51c5d07ce40ab..c751e8861a99b 100644
|
||||
--- a/lib/file.c
|
||||
+++ b/lib/file.c
|
||||
@@ -240,7 +240,7 @@ static CURLcode file_connect(struct Curl_easy *data, bool *done)
|
||||
file->freepath = real_path; /* free this when done */
|
||||
|
||||
file->fd = fd;
|
||||
- if(!data->set.upload && (fd == -1)) {
|
||||
+ if(!data->state.upload && (fd == -1)) {
|
||||
failf(data, "Couldn't open file %s", data->state.up.path);
|
||||
file_done(data, CURLE_FILE_COULDNT_READ_FILE, FALSE);
|
||||
return CURLE_FILE_COULDNT_READ_FILE;
|
||||
@@ -422,7 +422,7 @@ static CURLcode file_do(struct Curl_easy *data, bool *done)
|
||||
|
||||
Curl_pgrsStartNow(data);
|
||||
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
return file_upload(data);
|
||||
|
||||
file = data->req.p.file;
|
||||
diff --git a/lib/ftp.c b/lib/ftp.c
|
||||
index f50d7baf622f8..4ff68cc454cbc 100644
|
||||
--- a/lib/ftp.c
|
||||
+++ b/lib/ftp.c
|
||||
@@ -1348,7 +1348,7 @@ static CURLcode ftp_state_prepare_transfer(struct Curl_easy *data)
|
||||
data->set.str[STRING_CUSTOMREQUEST]?
|
||||
data->set.str[STRING_CUSTOMREQUEST]:
|
||||
(data->state.list_only?"NLST":"LIST"));
|
||||
- else if(data->set.upload)
|
||||
+ else if(data->state.upload)
|
||||
result = Curl_pp_sendf(data, &ftpc->pp, "PRET STOR %s",
|
||||
conn->proto.ftpc.file);
|
||||
else
|
||||
@@ -3384,7 +3384,7 @@ static CURLcode ftp_done(struct Curl_easy *data, CURLcode status,
|
||||
/* the response code from the transfer showed an error already so no
|
||||
use checking further */
|
||||
;
|
||||
- else if(data->set.upload) {
|
||||
+ else if(data->state.upload) {
|
||||
if((-1 != data->state.infilesize) &&
|
||||
(data->state.infilesize != data->req.writebytecount) &&
|
||||
!data->set.crlf &&
|
||||
@@ -3640,7 +3640,7 @@ static CURLcode ftp_do_more(struct Curl_easy *data, int *completep)
|
||||
connected back to us */
|
||||
}
|
||||
}
|
||||
- else if(data->set.upload) {
|
||||
+ else if(data->state.upload) {
|
||||
result = ftp_nb_type(data, conn, data->state.prefer_ascii,
|
||||
FTP_STOR_TYPE);
|
||||
if(result)
|
||||
@@ -4225,7 +4225,7 @@ CURLcode ftp_parse_url_path(struct Curl_easy *data)
|
||||
ftpc->file = NULL; /* instead of point to a zero byte,
|
||||
we make it a NULL pointer */
|
||||
|
||||
- if(data->set.upload && !ftpc->file && (ftp->transfer == PPTRANSFER_BODY)) {
|
||||
+ if(data->state.upload && !ftpc->file && (ftp->transfer == PPTRANSFER_BODY)) {
|
||||
/* We need a file name when uploading. Return error! */
|
||||
failf(data, "Uploading to a URL without a file name");
|
||||
free(rawPath);
|
||||
diff --git a/lib/http.c b/lib/http.c
|
||||
index 80e43f6f361e8..bffdd3468536d 100644
|
||||
--- a/lib/http.c
|
||||
+++ b/lib/http.c
|
||||
@@ -2112,7 +2112,7 @@ void Curl_http_method(struct Curl_easy *data, struct connectdata *conn,
|
||||
Curl_HttpReq httpreq = (Curl_HttpReq)data->state.httpreq;
|
||||
const char *request;
|
||||
if((conn->handler->protocol&(PROTO_FAMILY_HTTP|CURLPROTO_FTP)) &&
|
||||
- data->set.upload)
|
||||
+ data->state.upload)
|
||||
httpreq = HTTPREQ_PUT;
|
||||
|
||||
/* Now set the 'request' pointer to the proper request string */
|
||||
@@ -2423,7 +2423,7 @@ CURLcode Curl_http_body(struct Curl_easy *data, struct connectdata *conn,
|
||||
if((conn->handler->protocol & PROTO_FAMILY_HTTP) &&
|
||||
(((httpreq == HTTPREQ_POST_MIME || httpreq == HTTPREQ_POST_FORM) &&
|
||||
http->postsize < 0) ||
|
||||
- ((data->set.upload || httpreq == HTTPREQ_POST) &&
|
||||
+ ((data->state.upload || httpreq == HTTPREQ_POST) &&
|
||||
data->state.infilesize == -1))) {
|
||||
if(conn->bits.authneg)
|
||||
/* don't enable chunked during auth neg */
|
||||
diff --git a/lib/imap.c b/lib/imap.c
|
||||
index c2f675d4b2618..1952e66a1efcd 100644
|
||||
--- a/lib/imap.c
|
||||
+++ b/lib/imap.c
|
||||
@@ -1511,11 +1511,11 @@ static CURLcode imap_done(struct Curl_easy *data, CURLcode status,
|
||||
result = status; /* use the already set error code */
|
||||
}
|
||||
else if(!data->set.connect_only && !imap->custom &&
|
||||
- (imap->uid || imap->mindex || data->set.upload ||
|
||||
+ (imap->uid || imap->mindex || data->state.upload ||
|
||||
data->set.mimepost.kind != MIMEKIND_NONE)) {
|
||||
/* Handle responses after FETCH or APPEND transfer has finished */
|
||||
|
||||
- if(!data->set.upload && data->set.mimepost.kind == MIMEKIND_NONE)
|
||||
+ if(!data->state.upload && data->set.mimepost.kind == MIMEKIND_NONE)
|
||||
state(data, IMAP_FETCH_FINAL);
|
||||
else {
|
||||
/* End the APPEND command first by sending an empty line */
|
||||
@@ -1581,7 +1581,7 @@ static CURLcode imap_perform(struct Curl_easy *data, bool *connected,
|
||||
selected = TRUE;
|
||||
|
||||
/* Start the first command in the DO phase */
|
||||
- if(data->set.upload || data->set.mimepost.kind != MIMEKIND_NONE)
|
||||
+ if(data->state.upload || data->set.mimepost.kind != MIMEKIND_NONE)
|
||||
/* APPEND can be executed directly */
|
||||
result = imap_perform_append(data);
|
||||
else if(imap->custom && (selected || !imap->mailbox))
|
||||
diff --git a/lib/rtsp.c b/lib/rtsp.c
|
||||
index ea99d720ec4eb..ccd7264b00e74 100644
|
||||
--- a/lib/rtsp.c
|
||||
+++ b/lib/rtsp.c
|
||||
@@ -493,7 +493,7 @@ static CURLcode rtsp_do(struct Curl_easy *data, bool *done)
|
||||
rtspreq == RTSPREQ_SET_PARAMETER ||
|
||||
rtspreq == RTSPREQ_GET_PARAMETER) {
|
||||
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
putsize = data->state.infilesize;
|
||||
data->state.httpreq = HTTPREQ_PUT;
|
||||
|
||||
@@ -512,7 +512,7 @@ static CURLcode rtsp_do(struct Curl_easy *data, bool *done)
|
||||
result =
|
||||
Curl_dyn_addf(&req_buffer,
|
||||
"Content-Length: %" CURL_FORMAT_CURL_OFF_T"\r\n",
|
||||
- (data->set.upload ? putsize : postsize));
|
||||
+ (data->state.upload ? putsize : postsize));
|
||||
if(result)
|
||||
return result;
|
||||
}
|
||||
diff --git a/lib/setopt.c b/lib/setopt.c
|
||||
index 38f5711e44191..0c3b9634d1192 100644
|
||||
--- a/lib/setopt.c
|
||||
+++ b/lib/setopt.c
|
||||
@@ -333,8 +333,8 @@ CURLcode Curl_vsetopt(struct Curl_easy *data, CURLoption option, va_list param)
|
||||
* We want to sent data to the remote host. If this is HTTP, that equals
|
||||
* using the PUT request.
|
||||
*/
|
||||
- data->set.upload = (0 != va_arg(param, long)) ? TRUE : FALSE;
|
||||
- if(data->set.upload) {
|
||||
+ arg = va_arg(param, long);
|
||||
+ if(arg) {
|
||||
/* If this is HTTP, PUT is what's needed to "upload" */
|
||||
data->set.method = HTTPREQ_PUT;
|
||||
data->set.opt_no_body = FALSE; /* this is implied */
|
||||
@@ -664,7 +664,6 @@ CURLcode Curl_vsetopt(struct Curl_easy *data, CURLoption option, va_list param)
|
||||
}
|
||||
else
|
||||
data->set.method = HTTPREQ_GET;
|
||||
- data->set.upload = FALSE;
|
||||
break;
|
||||
|
||||
#ifndef CURL_DISABLE_MIME
|
||||
@@ -888,7 +887,6 @@ CURLcode Curl_vsetopt(struct Curl_easy *data, CURLoption option, va_list param)
|
||||
*/
|
||||
if(va_arg(param, long)) {
|
||||
data->set.method = HTTPREQ_GET;
|
||||
- data->set.upload = FALSE; /* switch off upload */
|
||||
data->set.opt_no_body = FALSE; /* this is implied */
|
||||
}
|
||||
break;
|
||||
diff --git a/lib/smb.c b/lib/smb.c
|
||||
index a1e444ee6b97e..d6822213529bc 100644
|
||||
--- a/lib/smb.c
|
||||
+++ b/lib/smb.c
|
||||
@@ -530,7 +530,7 @@ static CURLcode smb_send_open(struct Curl_easy *data)
|
||||
byte_count = strlen(req->path);
|
||||
msg.name_length = smb_swap16((unsigned short)byte_count);
|
||||
msg.share_access = smb_swap32(SMB_FILE_SHARE_ALL);
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
msg.access = smb_swap32(SMB_GENERIC_READ | SMB_GENERIC_WRITE);
|
||||
msg.create_disposition = smb_swap32(SMB_FILE_OVERWRITE_IF);
|
||||
}
|
||||
@@ -762,7 +762,7 @@ static CURLcode smb_request_state(struct Curl_easy *data, bool *done)
|
||||
void *msg = NULL;
|
||||
const struct smb_nt_create_response *smb_m;
|
||||
|
||||
- if(data->set.upload && (data->state.infilesize < 0)) {
|
||||
+ if(data->state.upload && (data->state.infilesize < 0)) {
|
||||
failf(data, "SMB upload needs to know the size up front");
|
||||
return CURLE_SEND_ERROR;
|
||||
}
|
||||
@@ -813,7 +813,7 @@ static CURLcode smb_request_state(struct Curl_easy *data, bool *done)
|
||||
smb_m = (const struct smb_nt_create_response*) msg;
|
||||
req->fid = smb_swap16(smb_m->fid);
|
||||
data->req.offset = 0;
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
data->req.size = data->state.infilesize;
|
||||
Curl_pgrsSetUploadSize(data, data->req.size);
|
||||
next_state = SMB_UPLOAD;
|
||||
diff --git a/lib/smtp.c b/lib/smtp.c
|
||||
index 7a030308d4689..c182cace742d7 100644
|
||||
--- a/lib/smtp.c
|
||||
+++ b/lib/smtp.c
|
||||
@@ -1419,7 +1419,7 @@ static CURLcode smtp_done(struct Curl_easy *data, CURLcode status,
|
||||
result = status; /* use the already set error code */
|
||||
}
|
||||
else if(!data->set.connect_only && data->set.mail_rcpt &&
|
||||
- (data->set.upload || data->set.mimepost.kind)) {
|
||||
+ (data->state.upload || data->set.mimepost.kind)) {
|
||||
/* Calculate the EOB taking into account any terminating CRLF from the
|
||||
previous line of the email or the CRLF of the DATA command when there
|
||||
is "no mail data". RFC-5321, sect. 4.1.1.4.
|
||||
@@ -1511,7 +1511,7 @@ static CURLcode smtp_perform(struct Curl_easy *data, bool *connected,
|
||||
smtp->eob = 2;
|
||||
|
||||
/* Start the first command in the DO phase */
|
||||
- if((data->set.upload || data->set.mimepost.kind) && data->set.mail_rcpt)
|
||||
+ if((data->state.upload || data->set.mimepost.kind) && data->set.mail_rcpt)
|
||||
/* MAIL transfer */
|
||||
result = smtp_perform_mail(data);
|
||||
else
|
||||
diff --git a/lib/tftp.c b/lib/tftp.c
|
||||
index 164d3c723c5b9..8ed1b887b4d21 100644
|
||||
--- a/lib/tftp.c
|
||||
+++ b/lib/tftp.c
|
||||
@@ -370,7 +370,7 @@ static CURLcode tftp_parse_option_ack(struct tftp_state_data *state,
|
||||
|
||||
/* tsize should be ignored on upload: Who cares about the size of the
|
||||
remote file? */
|
||||
- if(!data->set.upload) {
|
||||
+ if(!data->state.upload) {
|
||||
if(!tsize) {
|
||||
failf(data, "invalid tsize -:%s:- value in OACK packet", value);
|
||||
return CURLE_TFTP_ILLEGAL;
|
||||
@@ -451,7 +451,7 @@ static CURLcode tftp_send_first(struct tftp_state_data *state,
|
||||
return result;
|
||||
}
|
||||
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
/* If we are uploading, send an WRQ */
|
||||
setpacketevent(&state->spacket, TFTP_EVENT_WRQ);
|
||||
state->data->req.upload_fromhere =
|
||||
@@ -486,7 +486,7 @@ static CURLcode tftp_send_first(struct tftp_state_data *state,
|
||||
if(!data->set.tftp_no_options) {
|
||||
char buf[64];
|
||||
/* add tsize option */
|
||||
- if(data->set.upload && (data->state.infilesize != -1))
|
||||
+ if(data->state.upload && (data->state.infilesize != -1))
|
||||
msnprintf(buf, sizeof(buf), "%" CURL_FORMAT_CURL_OFF_T,
|
||||
data->state.infilesize);
|
||||
else
|
||||
@@ -540,7 +540,7 @@ static CURLcode tftp_send_first(struct tftp_state_data *state,
|
||||
break;
|
||||
|
||||
case TFTP_EVENT_OACK:
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
result = tftp_connect_for_tx(state, event);
|
||||
}
|
||||
else {
|
||||
diff --git a/lib/transfer.c b/lib/transfer.c
|
||||
index e9ab8fbf09510..cb69f3365855a 100644
|
||||
--- a/lib/transfer.c
|
||||
+++ b/lib/transfer.c
|
||||
@@ -1293,6 +1293,7 @@ void Curl_init_CONNECT(struct Curl_easy *data)
|
||||
{
|
||||
data->state.fread_func = data->set.fread_func_set;
|
||||
data->state.in = data->set.in_set;
|
||||
+ data->state.upload = (data->state.httpreq == HTTPREQ_PUT);
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -1732,7 +1733,6 @@ CURLcode Curl_follow(struct Curl_easy *data,
|
||||
data->state.httpreq != HTTPREQ_POST_MIME) ||
|
||||
!(data->set.keep_post & CURL_REDIR_POST_303))) {
|
||||
data->state.httpreq = HTTPREQ_GET;
|
||||
- data->set.upload = false;
|
||||
infof(data, "Switch to %s",
|
||||
data->req.no_body?"HEAD":"GET");
|
||||
}
|
||||
@@ -1770,7 +1770,7 @@ CURLcode Curl_retry_request(struct Curl_easy *data, char **url)
|
||||
|
||||
/* if we're talking upload, we can't do the checks below, unless the protocol
|
||||
is HTTP as when uploading over HTTP we will still get a response */
|
||||
- if(data->set.upload &&
|
||||
+ if(data->state.upload &&
|
||||
!(conn->handler->protocol&(PROTO_FAMILY_HTTP|CURLPROTO_RTSP)))
|
||||
return CURLE_OK;
|
||||
|
||||
diff --git a/lib/urldata.h b/lib/urldata.h
|
||||
index cca992a0295aa..a8580bdb66fe8 100644
|
||||
--- a/lib/urldata.h
|
||||
+++ b/lib/urldata.h
|
||||
@@ -1462,6 +1462,7 @@ struct UrlState {
|
||||
BIT(rewindbeforesend);/* TRUE when the sending couldn't be stopped even
|
||||
though it will be discarded. We must call the data
|
||||
rewind callback before trying to send again. */
|
||||
+ BIT(upload); /* upload request */
|
||||
};
|
||||
|
||||
/*
|
||||
@@ -1838,7 +1839,6 @@ struct UserDefined {
|
||||
BIT(http_auto_referer); /* set "correct" referer when following
|
||||
location: */
|
||||
BIT(opt_no_body); /* as set with CURLOPT_NOBODY */
|
||||
- BIT(upload); /* upload request */
|
||||
BIT(verbose); /* output verbosity */
|
||||
BIT(krb); /* Kerberos connection requested */
|
||||
BIT(reuse_forbid); /* forbidden to be reused, close after use */
|
||||
diff --git a/lib/vssh/libssh.c b/lib/vssh/libssh.c
|
||||
index b31f741ba9492..d60edaa303642 100644
|
||||
--- a/lib/vssh/libssh.c
|
||||
+++ b/lib/vssh/libssh.c
|
||||
@@ -1209,7 +1209,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
case SSH_SFTP_TRANS_INIT:
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
state(data, SSH_SFTP_UPLOAD_INIT);
|
||||
else {
|
||||
if(protop->path[strlen(protop->path)-1] == '/')
|
||||
@@ -1802,7 +1802,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
/* Functions from the SCP subsystem cannot handle/return SSH_AGAIN */
|
||||
ssh_set_blocking(sshc->ssh_session, 1);
|
||||
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
if(data->state.infilesize < 0) {
|
||||
failf(data, "SCP requires a known file size for upload");
|
||||
sshc->actualcode = CURLE_UPLOAD_FAILED;
|
||||
@@ -1907,7 +1907,7 @@ static CURLcode myssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
break;
|
||||
}
|
||||
case SSH_SCP_DONE:
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
state(data, SSH_SCP_SEND_EOF);
|
||||
else
|
||||
state(data, SSH_SCP_CHANNEL_FREE);
|
||||
diff --git a/lib/vssh/libssh2.c b/lib/vssh/libssh2.c
|
||||
index f1154dc47a74e..f2e5352d1fd3a 100644
|
||||
--- a/lib/vssh/libssh2.c
|
||||
+++ b/lib/vssh/libssh2.c
|
||||
@@ -2019,7 +2019,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
|
||||
case SSH_SFTP_TRANS_INIT:
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
state(data, SSH_SFTP_UPLOAD_INIT);
|
||||
else {
|
||||
if(sshp->path[strlen(sshp->path)-1] == '/')
|
||||
@@ -2691,7 +2691,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
break;
|
||||
}
|
||||
|
||||
- if(data->set.upload) {
|
||||
+ if(data->state.upload) {
|
||||
if(data->state.infilesize < 0) {
|
||||
failf(data, "SCP requires a known file size for upload");
|
||||
sshc->actualcode = CURLE_UPLOAD_FAILED;
|
||||
@@ -2831,7 +2831,7 @@ static CURLcode ssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
break;
|
||||
|
||||
case SSH_SCP_DONE:
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
state(data, SSH_SCP_SEND_EOF);
|
||||
else
|
||||
state(data, SSH_SCP_CHANNEL_FREE);
|
||||
diff --git a/lib/vssh/wolfssh.c b/lib/vssh/wolfssh.c
|
||||
index 17d59ecd23bc8..2ca91b7363b1d 100644
|
||||
--- a/lib/vssh/wolfssh.c
|
||||
+++ b/lib/vssh/wolfssh.c
|
||||
@@ -557,7 +557,7 @@ static CURLcode wssh_statemach_act(struct Curl_easy *data, bool *block)
|
||||
}
|
||||
break;
|
||||
case SSH_SFTP_TRANS_INIT:
|
||||
- if(data->set.upload)
|
||||
+ if(data->state.upload)
|
||||
state(data, SSH_SFTP_UPLOAD_INIT);
|
||||
else {
|
||||
if(sftp_scp->path[strlen(sftp_scp->path)-1] == '/')
|
34
curl-CVE-2023-32001.patch
Normal file
34
curl-CVE-2023-32001.patch
Normal file
|
@ -0,0 +1,34 @@
|
|||
From 0c667188e0c6cda615a036b8a2b4125f2c404dde Mon Sep 17 00:00:00 2001
|
||||
From: SaltyMilk <soufiane.elmelcaoui@gmail.com>
|
||||
Date: Mon, 10 Jul 2023 21:43:28 +0200
|
||||
Subject: [PATCH] fopen: optimize
|
||||
|
||||
Closes #11419
|
||||
---
|
||||
lib/fopen.c | 12 ++++++------
|
||||
1 file changed, 6 insertions(+), 6 deletions(-)
|
||||
|
||||
diff --git a/lib/fopen.c b/lib/fopen.c
|
||||
index c9c9e3d6e73a2..b6e3cadddef65 100644
|
||||
--- a/lib/fopen.c
|
||||
+++ b/lib/fopen.c
|
||||
@@ -56,13 +56,13 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename,
|
||||
int fd = -1;
|
||||
*tempname = NULL;
|
||||
|
||||
- if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {
|
||||
- /* a non-regular file, fallback to direct fopen() */
|
||||
- *fh = fopen(filename, FOPEN_WRITETEXT);
|
||||
- if(*fh)
|
||||
- return CURLE_OK;
|
||||
+ *fh = fopen(filename, FOPEN_WRITETEXT);
|
||||
+ if(!*fh)
|
||||
goto fail;
|
||||
- }
|
||||
+ if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode))
|
||||
+ return CURLE_OK;
|
||||
+ fclose(*fh);
|
||||
+ *fh = NULL;
|
||||
|
||||
result = Curl_rand_hex(data, randsuffix, sizeof(randsuffix));
|
||||
if(result)
|
211
curl-CVE-2023-38039.patch
Normal file
211
curl-CVE-2023-38039.patch
Normal file
|
@ -0,0 +1,211 @@
|
|||
From 3ee79c1674fd6f99e8efca52cd7510e08b766770 Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Wed, 2 Aug 2023 23:34:48 +0200
|
||||
Subject: [PATCH] http: return error when receiving too large header set
|
||||
|
||||
To avoid abuse. The limit is set to 300 KB for the accumulated size of
|
||||
all received HTTP headers for a single response. Incomplete research
|
||||
suggests that Chrome uses a 256-300 KB limit, while Firefox allows up to
|
||||
1MB.
|
||||
|
||||
Closes #11582
|
||||
---
|
||||
lib/c-hyper.c | 12 +++++++-----
|
||||
lib/cf-h1-proxy.c | 4 +++-
|
||||
lib/http.c | 34 ++++++++++++++++++++++++++++++----
|
||||
lib/http.h | 9 +++++++++
|
||||
lib/pingpong.c | 4 +++-
|
||||
lib/urldata.h | 17 ++++++++---------
|
||||
6 files changed, 60 insertions(+), 20 deletions(-)
|
||||
|
||||
Index: curl-8.0.1/lib/c-hyper.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/c-hyper.c
|
||||
+++ curl-8.0.1/lib/c-hyper.c
|
||||
@@ -174,8 +174,11 @@ static int hyper_each_header(void *userd
|
||||
}
|
||||
}
|
||||
|
||||
- data->info.header_size += (curl_off_t)len;
|
||||
- data->req.headerbytecount += (curl_off_t)len;
|
||||
+ result = Curl_bump_headersize(data, len, FALSE);
|
||||
+ if(result) {
|
||||
+ data->state.hresult = result;
|
||||
+ return HYPER_ITER_BREAK;
|
||||
+ }
|
||||
return HYPER_ITER_CONTINUE;
|
||||
}
|
||||
|
||||
@@ -305,9 +308,8 @@ static CURLcode status_line(struct Curl_
|
||||
if(result)
|
||||
return result;
|
||||
}
|
||||
- data->info.header_size += (curl_off_t)len;
|
||||
- data->req.headerbytecount += (curl_off_t)len;
|
||||
- return CURLE_OK;
|
||||
+ result = Curl_bump_headersize(data, len, FALSE);
|
||||
+ return result;
|
||||
}
|
||||
|
||||
/*
|
||||
Index: curl-8.0.1/lib/http.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/http.c
|
||||
+++ curl-8.0.1/lib/http.c
|
||||
@@ -3760,6 +3760,29 @@ static CURLcode verify_header(struct Cur
|
||||
return CURLE_OK;
|
||||
}
|
||||
|
||||
+CURLcode Curl_bump_headersize(struct Curl_easy *data,
|
||||
+ size_t delta,
|
||||
+ bool connect_only)
|
||||
+{
|
||||
+ size_t bad = 0;
|
||||
+ if(delta < MAX_HTTP_RESP_HEADER_SIZE) {
|
||||
+ if(!connect_only)
|
||||
+ data->req.headerbytecount += (unsigned int)delta;
|
||||
+ data->info.header_size += (unsigned int)delta;
|
||||
+ if(data->info.header_size > MAX_HTTP_RESP_HEADER_SIZE)
|
||||
+ bad = data->info.header_size;
|
||||
+ }
|
||||
+ else
|
||||
+ bad = data->info.header_size + delta;
|
||||
+ if(bad) {
|
||||
+ failf(data, "Too large response headers: %zu > %zu",
|
||||
+ bad, MAX_HTTP_RESP_HEADER_SIZE);
|
||||
+ return CURLE_RECV_ERROR;
|
||||
+ }
|
||||
+ return CURLE_OK;
|
||||
+}
|
||||
+
|
||||
+
|
||||
/*
|
||||
* Read any HTTP header lines from the server and pass them to the client app.
|
||||
*/
|
||||
@@ -4007,8 +4030,9 @@ CURLcode Curl_http_readwrite_headers(str
|
||||
if(result)
|
||||
return result;
|
||||
|
||||
- data->info.header_size += (long)headerlen;
|
||||
- data->req.headerbytecount += (long)headerlen;
|
||||
+ result = Curl_bump_headersize(data, headerlen, FALSE);
|
||||
+ if(result)
|
||||
+ return result;
|
||||
|
||||
/*
|
||||
* When all the headers have been parsed, see if we should give
|
||||
@@ -4330,8 +4354,10 @@ CURLcode Curl_http_readwrite_headers(str
|
||||
if(result)
|
||||
return result;
|
||||
|
||||
- data->info.header_size += Curl_dyn_len(&data->state.headerb);
|
||||
- data->req.headerbytecount += Curl_dyn_len(&data->state.headerb);
|
||||
+ result = Curl_bump_headersize(data, Curl_dyn_len(&data->state.headerb),
|
||||
+ FALSE);
|
||||
+ if(result)
|
||||
+ return result;
|
||||
|
||||
Curl_dyn_reset(&data->state.headerb);
|
||||
}
|
||||
Index: curl-8.0.1/lib/http.h
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/http.h
|
||||
+++ curl-8.0.1/lib/http.h
|
||||
@@ -61,6 +61,10 @@ extern const struct Curl_handler Curl_ha
|
||||
#endif /* websockets */
|
||||
|
||||
|
||||
+CURLcode Curl_bump_headersize(struct Curl_easy *data,
|
||||
+ size_t delta,
|
||||
+ bool connect_only);
|
||||
+
|
||||
/* Header specific functions */
|
||||
bool Curl_compareheader(const char *headerline, /* line to check */
|
||||
const char *header, /* header keyword _with_ colon */
|
||||
@@ -176,6 +180,11 @@ CURLcode Curl_http_auth_act(struct Curl_
|
||||
#define EXPECT_100_THRESHOLD (1024*1024)
|
||||
#endif
|
||||
|
||||
+/* MAX_HTTP_RESP_HEADER_SIZE is the maximum size of all response headers
|
||||
+ combined that libcurl allows for a single HTTP response, any HTTP
|
||||
+ version. This count includes CONNECT response headers. */
|
||||
+#define MAX_HTTP_RESP_HEADER_SIZE (300*1024)
|
||||
+
|
||||
#endif /* CURL_DISABLE_HTTP */
|
||||
|
||||
#ifdef USE_NGHTTP3
|
||||
Index: curl-8.0.1/lib/pingpong.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/pingpong.c
|
||||
+++ curl-8.0.1/lib/pingpong.c
|
||||
@@ -341,7 +341,9 @@ CURLcode Curl_pp_readresp(struct Curl_ea
|
||||
ssize_t clipamount = 0;
|
||||
bool restart = FALSE;
|
||||
|
||||
- data->req.headerbytecount += (long)gotbytes;
|
||||
+ result = Curl_bump_headersize(data, gotbytes, FALSE);
|
||||
+ if(result)
|
||||
+ return result;
|
||||
|
||||
pp->nread_resp += gotbytes;
|
||||
for(i = 0; i < gotbytes; ptr++, i++) {
|
||||
Index: curl-8.0.1/lib/urldata.h
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/urldata.h
|
||||
+++ curl-8.0.1/lib/urldata.h
|
||||
@@ -619,17 +619,16 @@ struct SingleRequest {
|
||||
curl_off_t bytecount; /* total number of bytes read */
|
||||
curl_off_t writebytecount; /* number of bytes written */
|
||||
|
||||
- curl_off_t headerbytecount; /* only count received headers */
|
||||
- curl_off_t deductheadercount; /* this amount of bytes doesn't count when we
|
||||
- check if anything has been transferred at
|
||||
- the end of a connection. We use this
|
||||
- counter to make only a 100 reply (without a
|
||||
- following second response code) result in a
|
||||
- CURLE_GOT_NOTHING error code */
|
||||
-
|
||||
curl_off_t pendingheader; /* this many bytes left to send is actually
|
||||
header and not body */
|
||||
struct curltime start; /* transfer started at this time */
|
||||
+ unsigned int headerbytecount; /* only count received headers */
|
||||
+ unsigned int deductheadercount; /* this amount of bytes doesn't count when
|
||||
+ we check if anything has been transferred
|
||||
+ at the end of a connection. We use this
|
||||
+ counter to make only a 100 reply (without
|
||||
+ a following second response code) result
|
||||
+ in a CURLE_GOT_NOTHING error code */
|
||||
enum {
|
||||
HEADER_NORMAL, /* no bad header at all */
|
||||
HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest
|
||||
@@ -1076,7 +1075,6 @@ struct PureInfo {
|
||||
int httpversion; /* the http version number X.Y = X*10+Y */
|
||||
time_t filetime; /* If requested, this is might get set. Set to -1 if the
|
||||
time was unretrievable. */
|
||||
- curl_off_t header_size; /* size of read header(s) in bytes */
|
||||
curl_off_t request_size; /* the amount of bytes sent in the request(s) */
|
||||
unsigned long proxyauthavail; /* what proxy auth types were announced */
|
||||
unsigned long httpauthavail; /* what host auth types were announced */
|
||||
@@ -1084,6 +1082,7 @@ struct PureInfo {
|
||||
char *contenttype; /* the content type of the object */
|
||||
char *wouldredirect; /* URL this would've been redirected to if asked to */
|
||||
curl_off_t retry_after; /* info from Retry-After: header */
|
||||
+ unsigned int header_size; /* size of read header(s) in bytes */
|
||||
|
||||
/* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip'
|
||||
and, 'conn_local_port' are copied over from the connectdata struct in
|
||||
Index: curl-8.0.1/lib/http_proxy.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/http_proxy.c
|
||||
+++ curl-8.0.1/lib/http_proxy.c
|
||||
@@ -586,7 +586,9 @@ static CURLcode recv_CONNECT_resp(struct
|
||||
return result;
|
||||
}
|
||||
|
||||
- data->info.header_size += (long)perline;
|
||||
+ result = Curl_bump_headersize(data, perline, TRUE);
|
||||
+ if(result)
|
||||
+ return result;
|
||||
|
||||
/* Newlines are CRLF, so the CR is ignored as the line isn't
|
||||
really terminated until the LF comes. Treat a following CR
|
132
curl-CVE-2023-38545.patch
Normal file
132
curl-CVE-2023-38545.patch
Normal file
|
@ -0,0 +1,132 @@
|
|||
From a6c541e709096a09eb3df6a8fbbe058239d63a55 Mon Sep 17 00:00:00 2001
|
||||
From: Jay Satiro <raysatiro@yahoo.com>
|
||||
Date: Sat, 30 Sep 2023 03:40:02 -0400
|
||||
Subject: [PATCH] socks: return error if hostname too long for remote resolve
|
||||
|
||||
Prior to this change the state machine attempted to change the remote
|
||||
resolve to a local resolve if the hostname was too long. Unfortunately
|
||||
that did not always work as intended, leading to a security issue. And
|
||||
when it did it's a privacy violation for users of socks5h that may
|
||||
expect their DNS requests will not leak.
|
||||
|
||||
Bug: https://curl.se/docs/CVE-2023-38545.html
|
||||
---
|
||||
lib/socks.c | 13 +++++----
|
||||
tests/data/Makefile.inc | 2 +-
|
||||
tests/data/test728 | 64 +++++++++++++++++++++++++++++++++++++++++
|
||||
3 files changed, 73 insertions(+), 6 deletions(-)
|
||||
create mode 100644 tests/data/test728
|
||||
|
||||
Index: curl-8.0.1/lib/socks.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/socks.c
|
||||
+++ curl-8.0.1/lib/socks.c
|
||||
@@ -586,11 +586,14 @@ static CURLproxycode do_SOCKS5(struct Cu
|
||||
infof(data, "SOCKS5: connecting to HTTP proxy %s port %d",
|
||||
sx->hostname, sx->remote_port);
|
||||
|
||||
- /* RFC1928 chapter 5 specifies max 255 chars for domain name in packet */
|
||||
+ /* RFC1928 chapter 5 specifies max 255 chars for domain name in packet.
|
||||
+ If remote resolve is enabled and the host is too long then error.
|
||||
+ The user's resolve setting is not overridden because that could be a
|
||||
+ privacy violation and unexpected. */
|
||||
if(!socks5_resolve_local && hostname_len > 255) {
|
||||
- infof(data, "SOCKS5: server resolving disabled for hostnames of "
|
||||
- "length > 255 [actual len=%zu]", hostname_len);
|
||||
- socks5_resolve_local = TRUE;
|
||||
+ failf(data, "SOCKS5: the destination hostname is too long to be "
|
||||
+ "resolved remotely by the proxy.");
|
||||
+ return CURLPX_LONG_HOSTNAME;
|
||||
}
|
||||
|
||||
if(auth & ~(CURLAUTH_BASIC | CURLAUTH_GSSAPI))
|
||||
@@ -904,7 +907,7 @@ static CURLproxycode do_SOCKS5(struct Cu
|
||||
}
|
||||
else {
|
||||
socksreq[len++] = 3;
|
||||
- socksreq[len++] = (char) hostname_len; /* one byte address length */
|
||||
+ socksreq[len++] = (unsigned char) hostname_len; /* one byte length */
|
||||
memcpy(&socksreq[len], sx->hostname, hostname_len); /* w/o NULL */
|
||||
len += hostname_len;
|
||||
}
|
||||
Index: curl-8.0.1/tests/data/Makefile.inc
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/tests/data/Makefile.inc
|
||||
+++ curl-8.0.1/tests/data/Makefile.inc
|
||||
@@ -101,6 +101,7 @@ test679 test680 test681 test682 test683
|
||||
test700 test701 test702 test703 test704 test705 test706 test707 test708 \
|
||||
test709 test710 test711 test712 test713 test714 test715 test716 test717 \
|
||||
test718 test719 test720 test721 \
|
||||
+test728 \
|
||||
\
|
||||
test800 test801 test802 test803 test804 test805 test806 test807 test808 \
|
||||
test809 test810 test811 test812 test813 test814 test815 test816 test817 \
|
||||
Index: curl-8.0.1/tests/data/test728
|
||||
===================================================================
|
||||
--- /dev/null
|
||||
+++ curl-8.0.1/tests/data/test728
|
||||
@@ -0,0 +1,64 @@
|
||||
+<testcase>
|
||||
+<info>
|
||||
+<keywords>
|
||||
+HTTP
|
||||
+HTTP GET
|
||||
+SOCKS5
|
||||
+SOCKS5h
|
||||
+followlocation
|
||||
+</keywords>
|
||||
+</info>
|
||||
+
|
||||
+#
|
||||
+# Server-side
|
||||
+<reply>
|
||||
+# The hostname in this redirect is 256 characters and too long (> 255) for
|
||||
+# SOCKS5 remote resolve. curl must return error CURLE_PROXY in this case.
|
||||
+<data>
|
||||
+HTTP/1.1 301 Moved Permanently
|
||||
+Location: http://AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/
|
||||
+Content-Length: 0
|
||||
+Connection: close
|
||||
+
|
||||
+</data>
|
||||
+</reply>
|
||||
+
|
||||
+#
|
||||
+# Client-side
|
||||
+<client>
|
||||
+<features>
|
||||
+proxy
|
||||
+</features>
|
||||
+<server>
|
||||
+http
|
||||
+socks5
|
||||
+</server>
|
||||
+ <name>
|
||||
+SOCKS5h with HTTP redirect to hostname too long
|
||||
+ </name>
|
||||
+ <command>
|
||||
+--no-progress-meter --location --proxy socks5h://%HOSTIP:%SOCKSPORT http://%HOSTIP:%HTTPPORT/%TESTNUMBER
|
||||
+</command>
|
||||
+</client>
|
||||
+
|
||||
+#
|
||||
+# Verify data after the test has been "shot"
|
||||
+<verify>
|
||||
+<protocol crlf="yes">
|
||||
+GET /%TESTNUMBER HTTP/1.1
|
||||
+Host: %HOSTIP:%HTTPPORT
|
||||
+User-Agent: curl/%VERSION
|
||||
+Accept: */*
|
||||
+
|
||||
+</protocol>
|
||||
+<errorcode>
|
||||
+97
|
||||
+</errorcode>
|
||||
+# the error message is verified because error code CURLE_PROXY (97) may be
|
||||
+# returned for any number of reasons and we need to make sure it is
|
||||
+# specifically for the reason below so that we know the check is working.
|
||||
+<stderr mode="text">
|
||||
+curl: (97) SOCKS5: the destination hostname is too long to be resolved remotely by the proxy.
|
||||
+</stderr>
|
||||
+</verify>
|
||||
+</testcase>
|
129
curl-CVE-2023-38546.patch
Normal file
129
curl-CVE-2023-38546.patch
Normal file
|
@ -0,0 +1,129 @@
|
|||
From 61275672b46d9abb3285740467b882e22ed75da8 Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Thu, 14 Sep 2023 23:28:32 +0200
|
||||
Subject: [PATCH] cookie: remove unnecessary struct fields
|
||||
|
||||
Plus: reduce the hash table size from 256 to 63. It seems unlikely to
|
||||
make much of a speed difference for most use cases but saves 1.5KB of
|
||||
data per instance.
|
||||
|
||||
Closes #11862
|
||||
---
|
||||
lib/cookie.c | 13 +------------
|
||||
lib/cookie.h | 13 ++++---------
|
||||
lib/easy.c | 4 +---
|
||||
3 files changed, 6 insertions(+), 24 deletions(-)
|
||||
|
||||
Index: curl-8.0.1/lib/cookie.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/cookie.c
|
||||
+++ curl-8.0.1/lib/cookie.c
|
||||
@@ -119,7 +119,6 @@ static void freecookie(struct Cookie *co
|
||||
free(co->name);
|
||||
free(co->value);
|
||||
free(co->maxage);
|
||||
- free(co->version);
|
||||
free(co);
|
||||
}
|
||||
|
||||
@@ -726,11 +725,7 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
}
|
||||
}
|
||||
else if((nlen == 7) && strncasecompare("version", namep, 7)) {
|
||||
- strstore(&co->version, valuep, vlen);
|
||||
- if(!co->version) {
|
||||
- badcookie = TRUE;
|
||||
- break;
|
||||
- }
|
||||
+ /* just ignore */
|
||||
}
|
||||
else if((nlen == 7) && strncasecompare("max-age", namep, 7)) {
|
||||
/*
|
||||
@@ -1174,7 +1169,6 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
free(clist->path);
|
||||
free(clist->spath);
|
||||
free(clist->expirestr);
|
||||
- free(clist->version);
|
||||
free(clist->maxage);
|
||||
|
||||
*clist = *co; /* then store all the new data */
|
||||
@@ -1238,9 +1232,6 @@ struct CookieInfo *Curl_cookie_init(stru
|
||||
c = calloc(1, sizeof(struct CookieInfo));
|
||||
if(!c)
|
||||
return NULL; /* failed to get memory */
|
||||
- c->filename = strdup(file?file:"none"); /* copy the name just in case */
|
||||
- if(!c->filename)
|
||||
- goto fail; /* failed to get memory */
|
||||
/*
|
||||
* Initialize the next_expiration time to signal that we don't have enough
|
||||
* information yet.
|
||||
@@ -1394,7 +1385,6 @@ static struct Cookie *dup_cookie(struct
|
||||
CLONE(name);
|
||||
CLONE(value);
|
||||
CLONE(maxage);
|
||||
- CLONE(version);
|
||||
d->expires = src->expires;
|
||||
d->tailmatch = src->tailmatch;
|
||||
d->secure = src->secure;
|
||||
@@ -1611,7 +1601,6 @@ void Curl_cookie_cleanup(struct CookieIn
|
||||
{
|
||||
if(c) {
|
||||
unsigned int i;
|
||||
- free(c->filename);
|
||||
for(i = 0; i < COOKIE_HASH_SIZE; i++)
|
||||
Curl_cookie_freelist(c->cookies[i]);
|
||||
free(c); /* free the base struct as well */
|
||||
Index: curl-8.0.1/lib/cookie.h
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/cookie.h
|
||||
+++ curl-8.0.1/lib/cookie.h
|
||||
@@ -36,11 +36,7 @@ struct Cookie {
|
||||
char *domain; /* domain = <this> */
|
||||
curl_off_t expires; /* expires = <this> */
|
||||
char *expirestr; /* the plain text version */
|
||||
-
|
||||
- /* RFC 2109 keywords. Version=1 means 2109-compliant cookie sending */
|
||||
- char *version; /* Version = <value> */
|
||||
char *maxage; /* Max-Age = <value> */
|
||||
-
|
||||
bool tailmatch; /* whether we do tail-matching of the domain name */
|
||||
bool secure; /* whether the 'secure' keyword was used */
|
||||
bool livecookie; /* updated from a server, not a stored file */
|
||||
@@ -56,18 +52,16 @@ struct Cookie {
|
||||
#define COOKIE_PREFIX__SECURE (1<<0)
|
||||
#define COOKIE_PREFIX__HOST (1<<1)
|
||||
|
||||
-#define COOKIE_HASH_SIZE 256
|
||||
+#define COOKIE_HASH_SIZE 63
|
||||
|
||||
struct CookieInfo {
|
||||
/* linked list of cookies we know of */
|
||||
struct Cookie *cookies[COOKIE_HASH_SIZE];
|
||||
-
|
||||
- char *filename; /* file we read from/write to */
|
||||
- long numcookies; /* number of cookies in the "jar" */
|
||||
+ curl_off_t next_expiration; /* the next time at which expiration happens */
|
||||
+ int numcookies; /* number of cookies in the "jar" */
|
||||
+ int lastct; /* last creation-time used in the jar */
|
||||
bool running; /* state info, for cookie adding information */
|
||||
bool newsession; /* new session, discard session cookies on load */
|
||||
- int lastct; /* last creation-time used in the jar */
|
||||
- curl_off_t next_expiration; /* the next time at which expiration happens */
|
||||
};
|
||||
|
||||
/* This is the maximum line length we accept for a cookie line. RFC 2109
|
||||
Index: curl-8.0.1/lib/easy.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/easy.c
|
||||
+++ curl-8.0.1/lib/easy.c
|
||||
@@ -911,9 +911,7 @@ struct Curl_easy *curl_easy_duphandle(st
|
||||
if(data->cookies) {
|
||||
/* If cookies are enabled in the parent handle, we enable them
|
||||
in the clone as well! */
|
||||
- outcurl->cookies = Curl_cookie_init(data,
|
||||
- data->cookies->filename,
|
||||
- outcurl->cookies,
|
||||
+ outcurl->cookies = Curl_cookie_init(data, NULL, outcurl->cookies,
|
||||
data->set.cookiesession);
|
||||
if(!outcurl->cookies)
|
||||
goto fail;
|
48
curl-CVE-2023-46218.patch
Normal file
48
curl-CVE-2023-46218.patch
Normal file
|
@ -0,0 +1,48 @@
|
|||
From 2b0994c29a721c91c572cff7808c572a24d251eb Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Thu, 23 Nov 2023 08:15:47 +0100
|
||||
Subject: [PATCH] cookie: lowercase the domain names before PSL checks
|
||||
|
||||
Reported-by: Harry Sintonen
|
||||
|
||||
Closes #12387
|
||||
---
|
||||
lib/cookie.c | 24 ++++++++++++++++--------
|
||||
1 file changed, 16 insertions(+), 8 deletions(-)
|
||||
|
||||
diff --git a/lib/cookie.c b/lib/cookie.c
|
||||
index 568cf537ad1b1f..9095cea3e97f22 100644
|
||||
--- a/lib/cookie.c
|
||||
+++ b/lib/cookie.c
|
||||
@@ -1027,15 +1027,23 @@ Curl_cookie_add(struct Curl_easy *data,
|
||||
* dereference it.
|
||||
*/
|
||||
if(data && (domain && co->domain && !Curl_host_is_ipnum(co->domain))) {
|
||||
- const psl_ctx_t *psl = Curl_psl_use(data);
|
||||
- int acceptable;
|
||||
-
|
||||
- if(psl) {
|
||||
- acceptable = psl_is_cookie_domain_acceptable(psl, domain, co->domain);
|
||||
- Curl_psl_release(data);
|
||||
+ bool acceptable = FALSE;
|
||||
+ char lcase[256];
|
||||
+ char lcookie[256];
|
||||
+ size_t dlen = strlen(domain);
|
||||
+ size_t clen = strlen(co->domain);
|
||||
+ if((dlen < sizeof(lcase)) && (clen < sizeof(lcookie))) {
|
||||
+ const psl_ctx_t *psl = Curl_psl_use(data);
|
||||
+ if(psl) {
|
||||
+ /* the PSL check requires lowercase domain name and pattern */
|
||||
+ Curl_strntolower(lcase, domain, dlen + 1);
|
||||
+ Curl_strntolower(lcookie, co->domain, clen + 1);
|
||||
+ acceptable = psl_is_cookie_domain_acceptable(psl, lcase, lcookie);
|
||||
+ Curl_psl_release(data);
|
||||
+ }
|
||||
+ else
|
||||
+ acceptable = !bad_domain(domain, strlen(domain));
|
||||
}
|
||||
- else
|
||||
- acceptable = !bad_domain(domain, strlen(domain));
|
||||
|
||||
if(!acceptable) {
|
||||
infof(data, "cookie '%s' dropped, domain '%s' must not "
|
127
curl-CVE-2023-46219.patch
Normal file
127
curl-CVE-2023-46219.patch
Normal file
|
@ -0,0 +1,127 @@
|
|||
From 73b65e94f3531179de45c6f3c836a610e3d0a846 Mon Sep 17 00:00:00 2001
|
||||
From: Daniel Stenberg <daniel@haxx.se>
|
||||
Date: Thu, 23 Nov 2023 08:23:17 +0100
|
||||
Subject: [PATCH] fopen: create short(er) temporary file name
|
||||
|
||||
Only using random letters in the name plus a ".tmp" extension. Not by
|
||||
appending characters to the final file name.
|
||||
|
||||
Reported-by: Maksymilian Arciemowicz
|
||||
|
||||
Closes #12388
|
||||
---
|
||||
lib/fopen.c | 65 ++++++++++++++++++++++++++++++++++++++++++++++++-----
|
||||
1 file changed, 60 insertions(+), 5 deletions(-)
|
||||
|
||||
Index: curl-8.0.1/lib/fopen.c
|
||||
===================================================================
|
||||
--- curl-8.0.1.orig/lib/fopen.c
|
||||
+++ curl-8.0.1/lib/fopen.c
|
||||
@@ -40,6 +40,51 @@
|
||||
#include "memdebug.h"
|
||||
|
||||
/*
|
||||
+ The dirslash() function breaks a null-terminated pathname string into
|
||||
+ directory and filename components then returns the directory component up
|
||||
+ to, *AND INCLUDING*, a final '/'. If there is no directory in the path,
|
||||
+ this instead returns a "" string.
|
||||
+
|
||||
+ This function returns a pointer to malloc'ed memory.
|
||||
+
|
||||
+ The input path to this function is expected to have a file name part.
|
||||
+*/
|
||||
+
|
||||
+#ifdef _WIN32
|
||||
+#define PATHSEP "\\"
|
||||
+#define IS_SEP(x) (((x) == '/') || ((x) == '\\'))
|
||||
+#elif defined(MSDOS) || defined(__EMX__) || defined(OS2)
|
||||
+#define PATHSEP "\\"
|
||||
+#define IS_SEP(x) ((x) == '\\')
|
||||
+#else
|
||||
+#define PATHSEP "/"
|
||||
+#define IS_SEP(x) ((x) == '/')
|
||||
+#endif
|
||||
+
|
||||
+static char *dirslash(const char *path)
|
||||
+{
|
||||
+ size_t n;
|
||||
+ struct dynbuf out;
|
||||
+ DEBUGASSERT(path);
|
||||
+ Curl_dyn_init(&out, CURL_MAX_INPUT_LENGTH);
|
||||
+ n = strlen(path);
|
||||
+ if(n) {
|
||||
+ /* find the rightmost path separator, if any */
|
||||
+ while(n && !IS_SEP(path[n-1]))
|
||||
+ --n;
|
||||
+ /* skip over all the path separators, if any */
|
||||
+ while(n && IS_SEP(path[n-1]))
|
||||
+ --n;
|
||||
+ }
|
||||
+ if(Curl_dyn_addn(&out, path, n))
|
||||
+ return NULL;
|
||||
+ /* if there was a directory, append a single trailing slash */
|
||||
+ if(n && Curl_dyn_addn(&out, PATHSEP, 1))
|
||||
+ return NULL;
|
||||
+ return Curl_dyn_ptr(&out);
|
||||
+}
|
||||
+
|
||||
+/*
|
||||
* Curl_fopen() opens a file for writing with a temp name, to be renamed
|
||||
* to the final name when completed. If there is an existing file using this
|
||||
* name at the time of the open, this function will clone the mode from that
|
||||
@@ -50,25 +95,34 @@ CURLcode Curl_fopen(struct Curl_easy *da
|
||||
FILE **fh, char **tempname)
|
||||
{
|
||||
CURLcode result = CURLE_WRITE_ERROR;
|
||||
- unsigned char randsuffix[9];
|
||||
+ unsigned char randbuf[41];
|
||||
char *tempstore = NULL;
|
||||
struct_stat sb;
|
||||
int fd = -1;
|
||||
+ char *dir;
|
||||
*tempname = NULL;
|
||||
|
||||
+ dir = dirslash(filename);
|
||||
+ if(!dir)
|
||||
+ goto fail;
|
||||
+
|
||||
*fh = fopen(filename, FOPEN_WRITETEXT);
|
||||
if(!*fh)
|
||||
goto fail;
|
||||
- if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode))
|
||||
+ if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode)) {
|
||||
+ free(dir);
|
||||
return CURLE_OK;
|
||||
+ }
|
||||
fclose(*fh);
|
||||
*fh = NULL;
|
||||
|
||||
- result = Curl_rand_hex(data, randsuffix, sizeof(randsuffix));
|
||||
+ result = Curl_rand_hex(data, randbuf, sizeof(randbuf));
|
||||
if(result)
|
||||
goto fail;
|
||||
|
||||
- tempstore = aprintf("%s.%s.tmp", filename, randsuffix);
|
||||
+ /* The temp file name should not end up too long for the target file
|
||||
+ system */
|
||||
+ tempstore = aprintf("%s%s.tmp", dir, randbuf);
|
||||
if(!tempstore) {
|
||||
result = CURLE_OUT_OF_MEMORY;
|
||||
goto fail;
|
||||
@@ -95,6 +149,7 @@ CURLcode Curl_fopen(struct Curl_easy *da
|
||||
if(!*fh)
|
||||
goto fail;
|
||||
|
||||
+ free(dir);
|
||||
*tempname = tempstore;
|
||||
return CURLE_OK;
|
||||
|
||||
@@ -105,7 +160,7 @@ fail:
|
||||
}
|
||||
|
||||
free(tempstore);
|
||||
-
|
||||
+ free(dir);
|
||||
return result;
|
||||
}
|
||||
|
20
curl-disabled-redirect-protocol-message.patch
Normal file
20
curl-disabled-redirect-protocol-message.patch
Normal file
|
@ -0,0 +1,20 @@
|
|||
Index: curl-7.63.0/lib/url.c
|
||||
===================================================================
|
||||
--- curl-7.63.0.orig/lib/url.c
|
||||
+++ curl-7.63.0/lib/url.c
|
||||
@@ -1976,9 +1976,13 @@ static CURLcode findprotocol(struct Curl
|
||||
/* it is allowed for "normal" request, now do an extra check if this is
|
||||
the result of a redirect */
|
||||
if(data->state.this_is_a_follow &&
|
||||
- !(data->set.redir_protocols & p->protocol))
|
||||
+ !(data->set.redir_protocols & p->protocol)) {
|
||||
/* nope, get out */
|
||||
- ;
|
||||
+ failf(data, "Redirect to protocol \"%s\" not supported or disabled in "
|
||||
+ LIBCURL_NAME, protostr);
|
||||
+
|
||||
+ return CURLE_UNSUPPORTED_PROTOCOL;
|
||||
+ }
|
||||
else {
|
||||
/* Perform setup complement if some. */
|
||||
conn->handler = conn->given = p;
|
26
curl-libssh_Implement_SFTP_packet_size_limit.patch
Normal file
26
curl-libssh_Implement_SFTP_packet_size_limit.patch
Normal file
|
@ -0,0 +1,26 @@
|
|||
From b9c8387c5ae3178d3eb65ad7b9d9683717d5012b Mon Sep 17 00:00:00 2001
|
||||
From: Jakub Jelen <jjelen@redhat.com>
|
||||
Date: Tue, 5 Sep 2023 17:33:41 +0200
|
||||
Subject: [PATCH] libssh: Implement SFTP packet size limit
|
||||
|
||||
Signed-off-by: Jakub Jelen <jjelen@redhat.com>
|
||||
---
|
||||
lib/vssh/libssh.c | 5 +++++
|
||||
1 file changed, 5 insertions(+)
|
||||
|
||||
diff --git a/lib/vssh/libssh.c b/lib/vssh/libssh.c
|
||||
index dea0084575859b..ba2573ec052271 100644
|
||||
--- a/lib/vssh/libssh.c
|
||||
+++ b/lib/vssh/libssh.c
|
||||
@@ -2567,6 +2567,11 @@ static ssize_t sftp_send(struct Curl_easy *data, int sockindex,
|
||||
struct connectdata *conn = data->conn;
|
||||
(void)sockindex;
|
||||
|
||||
+ /* limit the writes to the maximum specified in Section 3 of
|
||||
+ * https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-02
|
||||
+ */
|
||||
+ len = len > 32768 ? 32768 : len;
|
||||
+
|
||||
nwrite = sftp_write(conn->proto.sshc.sftp_file, mem, len);
|
||||
|
||||
myssh_block2waitfor(conn, FALSE);
|
41
curl-secure-getenv.patch
Normal file
41
curl-secure-getenv.patch
Normal file
|
@ -0,0 +1,41 @@
|
|||
Index: curl-7.82.0/lib/getenv.c
|
||||
===================================================================
|
||||
--- curl-7.82.0.orig/lib/getenv.c
|
||||
+++ curl-7.82.0/lib/getenv.c
|
||||
@@ -27,6 +27,14 @@
|
||||
|
||||
#include "memdebug.h"
|
||||
|
||||
+#ifndef HAVE_SECURE_GETENV
|
||||
+# ifdef HAVE___SECURE_GETENV
|
||||
+# define secure_getenv __secure_getenv
|
||||
+# else
|
||||
+# error neither secure_getenv nor __secure_getenv is available
|
||||
+# endif
|
||||
+#endif
|
||||
+
|
||||
static char *GetEnv(const char *variable)
|
||||
{
|
||||
#if defined(_WIN32_WCE) || defined(CURL_WINDOWS_APP)
|
||||
@@ -66,7 +74,7 @@ static char *GetEnv(const char *variable
|
||||
/* else rc is bytes needed, try again */
|
||||
}
|
||||
#else
|
||||
- char *env = getenv(variable);
|
||||
+ char *env = secure_getenv(variable);
|
||||
return (env && env[0])?strdup(env):NULL;
|
||||
#endif
|
||||
}
|
||||
Index: curl-7.82.0/configure.ac
|
||||
===================================================================
|
||||
--- curl-7.82.0.orig/configure.ac
|
||||
+++ curl-7.82.0/configure.ac
|
||||
@@ -4271,6 +4271,8 @@ if test "x$want_curldebug_assumed" = "xy
|
||||
ac_configure_args="$ac_configure_args --enable-curldebug"
|
||||
fi
|
||||
|
||||
+AC_CHECK_FUNCS([__secure_getenv secure_getenv])
|
||||
+
|
||||
AC_CONFIG_FILES([Makefile \
|
||||
docs/Makefile \
|
||||
docs/examples/Makefile \
|
5240
curl.changes
Normal file
5240
curl.changes
Normal file
File diff suppressed because it is too large
Load diff
77
curl.keyring
Normal file
77
curl.keyring
Normal file
|
@ -0,0 +1,77 @@
|
|||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: GnuPG v2
|
||||
|
||||
mQGiBD6tnnoRBACRPnFBVoapBrTpPrCNZ2rq3DcmW6n/soQJW47+zP+vcrcxQ1WJ
|
||||
QiWSzLGO+QOIUZSYfnliR22r8HkFX9EUSW3IAcRMJMsaO3wMJ0a+78a9QqWLp6RV
|
||||
0arcQkuuCvG79h+yJ6NnoAXe1geRt8vNGsaWtsS91CtYlTSs6JVtaRLnYwCg/Ly1
|
||||
EFgvNZ6SJRc/8I5rRv0lrz8D/0goih2kZ5z4SI+r2hgABNcN7g565YwGKaQDbIch
|
||||
soh3OBzgETWc3wuAZqmCzQXPXMpMx+ziqX6XDzDKNiGL1CdrBJQd0II8UutWVDje
|
||||
f9UxLfo02YQ8diGYeq0u9k1RezC13w4TVUmQfg0Uqn4xM6DNzO1O6yCK8rlNwsvL
|
||||
gHNJA/9m1pfzjpvdxtmJNKRU3C4cRCjXhxNdM7laSEj0/wOGaR2QWWEge51orWwo
|
||||
SLQUIe4BDPvtRStQHC+tI7qr7d12rMMEBXviJC5EkGBOzlgWr9virjM/u/pkGMc2
|
||||
m5r3pVuWH/JSsHsV952y2kWP64uP4zdLXOpVzX/xs0sYJ9nOPLQnRGFuaWVsIFN0
|
||||
ZW5iZXJnIChIYXh4KSA8ZGFuaWVsQGhheHguc2U+iF4EExECAB4CHgECF4AFAlQU
|
||||
ki4FCwkIBwMFFQoJCAsFFgIDAQAACgkQeOEcayedXJEOOwCggCsNHdAQPAlPte3w
|
||||
i2IZEekkM0YAoOXXPFAWjUwIHjZY41l7WgzACbANiFkEExECABkFAj6tnnoECwcD
|
||||
AgMVAgMDFgIBAh4BAheAAAoJEHjhHGsnnVyRjngAoO1y3LoSOEgD8vR062cdYDmv
|
||||
jLvVAJ0dmp1UiuQp+oMyq2VbWyw8LXN1XLkBDQQ+rZ59EAQAmYsA8gPjJ75gOIPb
|
||||
XNg9Z31QzIz65qS9XdNsFNAdKxnY4b72nhc0oaS9/7Dcdf2Q+1mDa2p72DWk+9iz
|
||||
7knmBL++csBP2z9eMe5h8oV53prqNOHDHyL3WLOa25ga9381gZnzWoQME74iSBBM
|
||||
wDw8vbLEgIZ34JaQ7Oe+9N3+6n8AAwcD/Av+Ms+3gCc5pLp4nx36qqi36fodaG9+
|
||||
dwIcMbr9bivEtjmDHeuPsD6X1J9+Y/ikUBIDpMPv33lJxLoubOtpLhEuN2XN/ojT
|
||||
rueVPDKA1f+GyfHnyfpf/78IgX1hGVqu/3RBWKPpXFwSZA4q8vFR+FaPC5WbU68t
|
||||
FLJpYuC9ZO/LiEYEGBECAAYFAj6tnn0ACgkQeOEcayedXJGtPQCgxrbd59afemZ9
|
||||
OIadZD8kUGC29dUAoJ94aGUkWCwoEiPyEZRGXv9XRlfxmQENBFcGhyIBCAC79AIx
|
||||
5hHixKmNtqbryuZTDwlt9XXkEn/QSrQD3pzgbsbBiWyqOV4hfscvtmoqA7koOw4h
|
||||
zZ/b8pJPA36eNzqMFIbkWpIit/BwA5bTKRkKXeD2kBFkjIN+iDuXawwhv7eNKH9O
|
||||
poAUe0K/esK/kvbMO721q24IgkOjB1Vtr/Y4Xkg7+VWVP0LFh7C/2Nwq6n2bktsA
|
||||
Ey9uCDD1hl8BdckN/XxpuUqSfxbF85GvYzzON67zOxxo6jqRXXcJ2PdPq0o9Ak0d
|
||||
6Fe7g9ZxOAeuYEbFTCZHBBccx84K0Bhn5tpqoq8Mq3f3mZfGBoe4J6wr17cxEDC8
|
||||
tTHUpDqk0CoLERUxABEBAAG0IERhbmllbCBTdGVuYmVyZyA8ZGFuaWVsQGhheHgu
|
||||
c2U+iQE3BBMBCgAhBQJXBociAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJ
|
||||
EPn+r/nTShvbHoAIAJDwb7dcAX4VGPa2oSuQqVnHsjDE7g8ATmcZq2IAzAG6bZg1
|
||||
svuhNyPQnL7kNrsz6Ew+yE4vH8mOjDUbc3feY4MzmtEMaB6VS0Xlna6cdtWkv4Y+
|
||||
Us4TuYSdftPZuZgI3nN/sXLlxWJCZgCPJJaGM6dXgyTFatk2P1LE98Qif7+ZMqfv
|
||||
+BA5L6cy2cAwJ5qbvLtuT25rTxooN54JETfwdhUD1NEIqTQxeC4E5lFvwedjAjLh
|
||||
Gswau8WMCdM/HzGbuQ9Gp3/RafYoAvMV6r6sskvUrWubCHj0u+uNgOpUHvlrwcFg
|
||||
rBirzQdElumCWqbJVCH0V5NcP/zSz1U1W8wSRqS5AQ0EVwaHIgEIALyCqpnax0cL
|
||||
y7EK3UiU2Kkryb7LPsZkia9hTcIZjNg0B8XAdqDYpHiquYtX0cz5I1sSZMBJ/xJP
|
||||
BF2ce/bmOTJtyW3GaF9a+M2zboZSzx9nlv9xx0o3bXBrBlL2vaG2TW+x2G53GA0/
|
||||
0chbj35PR+fvJx8ob/fHwCkfzGb1qCzwovhwGVUNHqI5bxK/xVwXfiycbllE3Hmf
|
||||
09BGeXKR7gQtaal8byKKlqCtayteEaPNQt6czYxZkVAOvY4ZDQKSZJUNwGFog3bG
|
||||
6rHr1J/0un6nAvX+wMuvRkUDiQxZZCel7e0Qcg3gPrYh+adlr0Tn7wyCP7/BULz8
|
||||
67fQfzc2ENkAEQEAAYkBHwQYAQoACQUCVwaHIgIbDAAKCRD5/q/500ob27KaB/9H
|
||||
a+iDip6mxFdoqy7TAefBy7KgbMQxxT926IcFqf70aJDzeVQI3lGCqN9GW03d+wPr
|
||||
LoyeQBQKNxxfQ9fEOvp1AXGWFIYYtEZIvQBpIqaSaA7W5IzqfDuO9xG89DNn8zKK
|
||||
nh/mbYJov/fywhBU6JH7bqdFSHbqoG9TY64s0BkV6shIVOubXLSG5G7LxXhw+xrb
|
||||
0zl4ie2wCeCBOLdbGHc+o2sKo1rBEz6UBK2DesPfkzxBO7lfa9HTcN03UJPHXmzb
|
||||
2mCbeFV8yPsTAoaGv4qZH1+FX+9Lv374xTSXa4CjQzSxd0dkZGG+YQjocoPftgsC
|
||||
OVsiqW0WhRVIEJ+hBAMUmQENBFcGiPEBCAC7sCnaZqWxfXNgBC7P28BSDUs9w4y/
|
||||
PEFsOv9bpgbgZagX1FnhG0eV71nm0p8v9T8Bft1eXaBd977Dq9pgk5qKO0xZo8fC
|
||||
8prFqB5db7fMUvPZCuJTTb6lGMz4OdfT6aHqUvJ+LFF1mKn8Eqt1Q4snHGSL1PI3
|
||||
/+435qDRQsU15GdYrj1waNJKk79aes9oguaI2/OTQqzIcOFK5tJjlSOD1ryOIH1e
|
||||
8vD+5MMpGvsRxv3sQHeTZkfZbkzSLFg/LKpoiQkyql1+BLNhBYq8oaE/jlvQrTEk
|
||||
bAyKpMScdyHwmkWWKjyZtXTrAtlComnki4yC2lAV9MXINHHvNJBcIXvVABEBAAG0
|
||||
IERhbmllbCBTdGVuYmVyZyA8ZGFuaWVsQGhheHguc2U+iQE3BBMBCgAhBQJXBojx
|
||||
AhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEFzJCP23HhLCOKkH/1CyoKiN
|
||||
2PCgTlWoYQspv/AAmsj+cFwZobI167KowA+o3zxQqxg0MV3ds8G+iig9OIuYurlQ
|
||||
L5Jr3CbDltaiXdWtVteRh/VKp61EwyXq77vjJbx81hvOuaXWWLSlU0KB3w7Hj6aD
|
||||
/mt16DpOcY9Aw90mKyvafRTqMF7TcT7J5HeGn2NL45dPkAhiMDEgEnw9yBTxK/x6
|
||||
UoQGPgiOWxSSN7Foj3mhUOflp8W0rnkLbJ4icpym6WuLKRMKAefDvk8GVlAWuXAb
|
||||
9gloL1P6u3uNHllq/IODR2bZUBI0QNKhvt0iSj7WKsc/kaqscl+AE9jd/6kXd6vh
|
||||
TNFWdzeco/2mGlaIRgQQEQoABgUCVwaJ/AAKCRB44RxrJ51ckWcaAKCJ6+arS/3k
|
||||
IMcO14Jz8dVf2BH3OACgwTenVSsK66qi+VfGCoALpzpiLDO5AQ0EVwaI8QEIAOxQ
|
||||
AEvF3idxcn80tbUhJg1J98fAS7Hx3WhlFG74uAikZQl1KZrprBu70RWTb7Nm1tvZ
|
||||
eXW65IlY7kk42bhfYDs1JrIPWOWKvVwKWDxoEbYgW/yvy1TOuXH276zbxLl5OEE8
|
||||
sQuOfXZsFSX2IPF9hsgNGaNzor8Ke7Y5BuCQLcGZWW5dLFbbKRKjXG8CaWmsJVoI
|
||||
c2nyXCAss2q9oCJ13X/5z+Ei392rwi1d3NxAYkSiDQan+fkWkCvZH+dHmFjQ1AND
|
||||
KielxcW1VfilK1hu9ziBBDf8TCEud/q0woIAH7rvIft4i3CqjymonByE4/OjfH8j
|
||||
4EteQ8qoknMCjjwNVqkAEQEAAYkBHwQYAQoACQUCVwaI8QIbDAAKCRBcyQj9tx4S
|
||||
wupjB/9TV4anbZK58bN7QJ5qGnU3GNjlvWFZXMw1u1xVc7abDJyqmFeJcJ4qLUkv
|
||||
BA0OsvlVnMWmeCmzsXhlQVM4Bv6IWyr7JBWgkK5q2CWVB59V7v7znf5kWnMGFhDF
|
||||
PlLsGbxDWLMoZGH+Iy84whMJFgferwCJy1dND/bHXPztfhvFXi8NNlJUFJa8Xtmu
|
||||
gm78C+nwNHcFpVC70HPr3oa8U1ODXMp7L8W/dL3eLYXmRCNd0urHgYrzDt6V/zf5
|
||||
ymvPk5w4HBocn2oRCJj/FXKhFAUptmpTE3g1yvYULmuFcNGAnPAExmAmd6NqsCmb
|
||||
j/qx4ytjt5uxt6Jm6IXV9cry8i6x
|
||||
=Phs/
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
195
curl.spec
Normal file
195
curl.spec
Normal file
|
@ -0,0 +1,195 @@
|
|||
#
|
||||
# spec file for package curl
|
||||
#
|
||||
# Copyright (c) 2022-2023 ZhuningOS
|
||||
#
|
||||
|
||||
|
||||
%bcond_without testsuite
|
||||
%bcond_with mozilla_nss
|
||||
# need ssl always for python-pycurl
|
||||
%bcond_without openssl
|
||||
Name: curl
|
||||
Version: 8.0.1
|
||||
Release: 150400.5.41.1
|
||||
Summary: A Tool for Transferring Data from URLs
|
||||
License: curl
|
||||
URL: https://curl.se
|
||||
Source: https://curl.se/download/curl-%{version}.tar.xz
|
||||
Source2: https://curl.se/download/curl-%{version}.tar.xz.asc
|
||||
Source3: baselibs.conf
|
||||
Source4: https://daniel.haxx.se/mykey.asc#/curl.keyring
|
||||
Patch0: libcurl-ocloexec.patch
|
||||
Patch1: dont-mess-with-rpmoptflags.patch
|
||||
Patch2: curl-secure-getenv.patch
|
||||
#PATCH-FIX-OPENSUSE bsc#1076446 protocol redirection not supported or disabled
|
||||
Patch3: curl-disabled-redirect-protocol-message.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1211230 CVE-2023-28319 use-after-free in SSH sha256 fingerprint check
|
||||
Patch4: curl-CVE-2023-28319.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1211231 CVE-2023-28320 siglongjmp race condition
|
||||
Patch5: curl-CVE-2023-28320.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1211232 CVE-2023-28321 IDN wildcard match
|
||||
Patch6: curl-CVE-2023-28321.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1211233 CVE-2023-28322 POST-after-PUT confusion
|
||||
Patch7: curl-CVE-2023-28322.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1213237 CVE-2023-32001 fopen race condition
|
||||
Patch8: curl-CVE-2023-32001.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1215026 CVE-2023-38039 HTTP headers eat all memory
|
||||
Patch9: curl-CVE-2023-38039.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1215888 CVE-2023-38545 SOCKS5 heap buffer overflow
|
||||
Patch10: curl-CVE-2023-38545.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1215889 CVE-2023-38546 cookie injection with none file
|
||||
Patch11: curl-CVE-2023-38546.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1217573 CVE-2023-46218 cookie mixed case PSL bypass
|
||||
Patch12: curl-CVE-2023-46218.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1217574 CVE-2023-46219 HSTS long file name clears contents
|
||||
Patch13: curl-CVE-2023-46219.patch
|
||||
#PATCH-FIX-UPSTREAM bsc#1216987 libssh: Implement SFTP packet size limit
|
||||
Patch14: curl-libssh_Implement_SFTP_packet_size_limit.patch
|
||||
BuildRequires: libtool
|
||||
BuildRequires: pkgconfig
|
||||
Requires: libcurl4 = %{version}
|
||||
BuildRequires: groff
|
||||
BuildRequires: lzma
|
||||
BuildRequires: openldap2-devel
|
||||
BuildRequires: pkgconfig(krb5)
|
||||
BuildRequires: pkgconfig(libbrotlidec)
|
||||
BuildRequires: pkgconfig(libidn2)
|
||||
# Disable metalink [bsc#1188217, CVE-2021-22922][bsc#1188218, CVE-2021-22923]
|
||||
# BuildRequires: pkgconfig(libmetalink)
|
||||
BuildRequires: pkgconfig(libnghttp2)
|
||||
BuildRequires: pkgconfig(libpsl)
|
||||
BuildRequires: pkgconfig(libssh)
|
||||
BuildRequires: pkgconfig(libzstd)
|
||||
BuildRequires: pkgconfig(zlib)
|
||||
%if %{with openssl}
|
||||
BuildRequires: pkgconfig(libssl)
|
||||
%endif
|
||||
%if %{with mozilla_nss}
|
||||
BuildRequires: mozilla-nss-devel
|
||||
%endif
|
||||
#BuildRequires: openssh
|
||||
%if 0%{?_with_stunnel:1}
|
||||
# used by the testsuite
|
||||
BuildRequires: stunnel
|
||||
%endif
|
||||
|
||||
%description
|
||||
Curl is a client to get documents and files from or send documents to a
|
||||
server using any of the supported protocols (HTTP, HTTPS, FTP, FTPS,
|
||||
TFTP, DICT, TELNET, LDAP, or FILE). The command is designed to work
|
||||
without user interaction or any kind of interactivity.
|
||||
|
||||
%package -n libcurl4
|
||||
Summary: Library for transferring data from URLs
|
||||
|
||||
%description -n libcurl4
|
||||
The cURL shared library for accessing data using different
|
||||
network protocols.
|
||||
|
||||
%package -n libcurl-devel
|
||||
Summary: Development files for the curl library
|
||||
Requires: glibc-devel
|
||||
Requires: libcurl4 = %{version}
|
||||
Provides: curl-devel = %{version}
|
||||
Obsoletes: curl-devel < %{version}
|
||||
|
||||
%description -n libcurl-devel
|
||||
Curl is a client to get documents and files from or send documents to a
|
||||
server using any of the supported protocols (HTTP, HTTPS, FTP, GOPHER,
|
||||
DICT, TELNET, LDAP, or FILE). The command is designed to work without
|
||||
user interaction or any kind of interactivity.
|
||||
|
||||
%prep
|
||||
%setup -q -n curl-%{version}
|
||||
%autopatch -p1
|
||||
|
||||
%build
|
||||
# curl complains if macro definition is contained in CFLAGS
|
||||
# see m4/xc-val-flgs.m4
|
||||
CPPFLAGS="-D_FORTIFY_SOURCE=2"
|
||||
CFLAGS=$(echo "%{optflags}" | sed -e 's/-D_FORTIFY_SOURCE=2//')
|
||||
export CPPFLAGS CFLAGS
|
||||
export CFLAGS="$CFLAGS -fPIE"
|
||||
export LDFLAGS="$LDFLAGS -Wl,-z,defs,-z,now,-z,relro -pie"
|
||||
autoreconf -fiv
|
||||
# local hack to make curl-config --libs stop printing libraries it depends on
|
||||
# (currently, libtool sets link_all_deplibs=(yes|unknown) everywhere,
|
||||
# will hopefully change in the future)
|
||||
sed -i 's/\(link_all_deplibs=\)unknown/\1no/' configure
|
||||
%configure \
|
||||
--enable-ipv6 \
|
||||
%if %{with openssl}
|
||||
--with-openssl \
|
||||
--with-ca-fallback \
|
||||
--without-ca-path \
|
||||
--without-ca-bundle \
|
||||
%else
|
||||
--without-openssl \
|
||||
%if %{with mozilla_nss}
|
||||
--with-nss \
|
||||
%endif
|
||||
%endif
|
||||
--with-gssapi=%{_libexecdir}/mit \
|
||||
--with-libidn2 \
|
||||
--with-libssh \
|
||||
--enable-symbol-hiding \
|
||||
--disable-static \
|
||||
--enable-threaded-resolver
|
||||
|
||||
# if this fails, the above sed hack did not work
|
||||
./libtool --config | grep -q link_all_deplibs=no
|
||||
# enable-hidden-symbols needs gcc4 and causes that curl exports only its API
|
||||
%make_build
|
||||
|
||||
%if %{with testsuite}
|
||||
%check
|
||||
pushd tests
|
||||
%make_build
|
||||
|
||||
find -type f -name "*.pl" -exec sed -i 's|#!.*/usr/bin/env perl|#!/usr/bin/perl|' "{}" +
|
||||
find -type f -name "*.py" -exec sed -i 's|#!.*/usr/bin/env python.*|#!/usr/bin/python3|' "{}" +
|
||||
|
||||
perl ./runtests.pl -a -v -p '!flaky' || exit
|
||||
popd
|
||||
%endif
|
||||
|
||||
%install
|
||||
%make_install
|
||||
rm -f %{buildroot}%{_libdir}/libcurl.la
|
||||
install -Dm 0644 docs/libcurl/libcurl.m4 %{buildroot}%{_datadir}/aclocal/libcurl.m4
|
||||
pushd scripts
|
||||
%make_install
|
||||
popd
|
||||
|
||||
%post -n libcurl4 -p /sbin/ldconfig
|
||||
%postun -n libcurl4 -p /sbin/ldconfig
|
||||
|
||||
%files
|
||||
%doc README RELEASE-NOTES CHANGES
|
||||
%doc docs/{BUGS.md,FAQ,FEATURES.md,TODO,TheArtOfHttpScripting.md}
|
||||
%{_bindir}/curl
|
||||
%{_datadir}/zsh/site-functions/_curl
|
||||
%{_mandir}/man1/curl.1%{?ext_man}
|
||||
%dir %{_datadir}/zsh
|
||||
%dir %{_datadir}/zsh/site-functions
|
||||
%dir %{_datadir}/fish/
|
||||
%dir %{_datadir}/fish/vendor_completions.d/
|
||||
%{_datadir}/fish/vendor_completions.d/curl.fish
|
||||
|
||||
%files -n libcurl4
|
||||
%license COPYING
|
||||
%{_libdir}/libcurl.so.4*
|
||||
|
||||
%files -n libcurl-devel
|
||||
%{_bindir}/curl-config
|
||||
%{_includedir}/curl
|
||||
%dir %{_datadir}/aclocal/
|
||||
%{_datadir}/aclocal/libcurl.m4
|
||||
%{_libdir}/libcurl.so
|
||||
%{_libdir}/pkgconfig/libcurl.pc
|
||||
%{_mandir}/man1/curl-config.1%{?ext_man}
|
||||
%{_mandir}/man3/*
|
||||
%doc docs/libcurl/symbols-in-versions
|
||||
|
||||
%changelog
|
15
dont-mess-with-rpmoptflags.patch
Normal file
15
dont-mess-with-rpmoptflags.patch
Normal file
|
@ -0,0 +1,15 @@
|
|||
Index: curl-7.82.0/configure.ac
|
||||
===================================================================
|
||||
--- curl-7.82.0.orig/configure.ac
|
||||
+++ curl-7.82.0/configure.ac
|
||||
@@ -395,10 +395,6 @@ dnl platform/compiler/architecture speci
|
||||
dnl **********************************************************************
|
||||
|
||||
CURL_CHECK_COMPILER
|
||||
-CURL_SET_COMPILER_BASIC_OPTS
|
||||
-CURL_SET_COMPILER_DEBUG_OPTS
|
||||
-CURL_SET_COMPILER_OPTIMIZE_OPTS
|
||||
-CURL_SET_COMPILER_WARNING_OPTS
|
||||
|
||||
if test "$compiler_id" = "INTEL_UNIX_C"; then
|
||||
#
|
93
libcurl-ocloexec.patch
Normal file
93
libcurl-ocloexec.patch
Normal file
|
@ -0,0 +1,93 @@
|
|||
Open library file descriptors with O_CLOEXEC
|
||||
This patch is non-portable, it needs linux 2.6.23 and glibc 2.7
|
||||
or later, different combinations (old linux, new glibc and vice-versa)
|
||||
will result in a crash.
|
||||
|
||||
To make it portable you have to test O_CLOEXEC support at *runtime*
|
||||
compile time is not enough.
|
||||
|
||||
|
||||
Index: curl-8.0.0/lib/file.c
|
||||
===================================================================
|
||||
--- curl-8.0.0.orig/lib/file.c
|
||||
+++ curl-8.0.0/lib/file.c
|
||||
@@ -232,7 +232,7 @@ static CURLcode file_connect(struct Curl
|
||||
}
|
||||
}
|
||||
#else
|
||||
- fd = open_readonly(real_path, O_RDONLY);
|
||||
+ fd = open_readonly(real_path, O_RDONLY|O_CLOEXEC);
|
||||
file->path = real_path;
|
||||
#endif
|
||||
#endif
|
||||
@@ -318,7 +318,7 @@ static CURLcode file_upload(struct Curl_
|
||||
else
|
||||
mode = MODE_DEFAULT|O_TRUNC;
|
||||
|
||||
- fd = open(file->path, mode, data->set.new_file_perms);
|
||||
+ fd = open(file->path, mode|O_CLOEXEC, data->set.new_file_perms);
|
||||
if(fd < 0) {
|
||||
failf(data, "Can't open %s for writing", file->path);
|
||||
return CURLE_WRITE_ERROR;
|
||||
Index: curl-8.0.0/lib/if2ip.c
|
||||
===================================================================
|
||||
--- curl-8.0.0.orig/lib/if2ip.c
|
||||
+++ curl-8.0.0/lib/if2ip.c
|
||||
@@ -206,7 +206,7 @@ if2ip_result_t Curl_if2ip(int af,
|
||||
if(len >= sizeof(req.ifr_name))
|
||||
return IF2IP_NOT_FOUND;
|
||||
|
||||
- dummy = socket(AF_INET, SOCK_STREAM, 0);
|
||||
+ dummy = socket(AF_INET, SOCK_STREAM|SOCK_CLOEXEC, 0);
|
||||
if(CURL_SOCKET_BAD == dummy)
|
||||
return IF2IP_NOT_FOUND;
|
||||
|
||||
Index: curl-8.0.0/configure.ac
|
||||
===================================================================
|
||||
--- curl-8.0.0.orig/configure.ac
|
||||
+++ curl-8.0.0/configure.ac
|
||||
@@ -420,6 +420,8 @@ AC_DEFINE_UNQUOTED(OS, "${host}", [cpu-m
|
||||
# Silence warning: ar: 'u' modifier ignored since 'D' is the default
|
||||
AC_SUBST(AR_FLAGS, [cr])
|
||||
|
||||
+AC_USE_SYSTEM_EXTENSIONS
|
||||
+
|
||||
dnl This defines _ALL_SOURCE for AIX
|
||||
CURL_CHECK_AIX_ALL_SOURCE
|
||||
|
||||
Index: curl-8.0.0/lib/hostip.c
|
||||
===================================================================
|
||||
--- curl-8.0.0.orig/lib/hostip.c
|
||||
+++ curl-8.0.0/lib/hostip.c
|
||||
@@ -48,6 +48,7 @@
|
||||
#include <signal.h>
|
||||
#endif
|
||||
|
||||
+#include <fcntl.h>
|
||||
#include "urldata.h"
|
||||
#include "sendf.h"
|
||||
#include "hostip.h"
|
||||
@@ -582,7 +583,7 @@ bool Curl_ipv6works(struct Curl_easy *da
|
||||
else {
|
||||
int ipv6_works = -1;
|
||||
/* probe to see if we have a working IPv6 stack */
|
||||
- curl_socket_t s = socket(PF_INET6, SOCK_DGRAM, 0);
|
||||
+ curl_socket_t s = socket(PF_INET6, SOCK_DGRAM|SOCK_CLOEXEC, 0);
|
||||
if(s == CURL_SOCKET_BAD)
|
||||
/* an IPv6 address was requested but we can't get/use one */
|
||||
ipv6_works = 0;
|
||||
Index: curl-8.0.0/lib/cf-socket.c
|
||||
===================================================================
|
||||
--- curl-8.0.0.orig/lib/cf-socket.c
|
||||
+++ curl-8.0.0/lib/cf-socket.c
|
||||
@@ -252,7 +252,9 @@ static CURLcode socket_open(struct Curl_
|
||||
}
|
||||
else {
|
||||
/* opensocket callback not set, so simply create the socket now */
|
||||
- *sockfd = socket(addr->family, addr->socktype, addr->protocol);
|
||||
+ *sockfd = socket(addr->family,
|
||||
+ addr->socktype|SOCK_CLOEXEC,
|
||||
+ addr->protocol);
|
||||
}
|
||||
|
||||
if(*sockfd == CURL_SOCKET_BAD)
|
Loading…
Add table
Reference in a new issue