curl-7.13.1-cve-2005-4077.patch 854 B

1234567891011121314151617181920212223
  1. --- curl-7.13.1/lib/url.c.cve-2005-4077 2005-12-08 13:08:03.000000000 +0100
  2. +++ curl-7.13.1/lib/url.c 2005-12-08 13:15:56.565790336 +0100
  3. @@ -2313,12 +2313,18 @@
  4. if(urllen < LEAST_PATH_ALLOC)
  5. urllen=LEAST_PATH_ALLOC;
  6. - conn->pathbuffer=(char *)malloc(urllen);
  7. + /*
  8. + * We malloc() the buffers below urllen+2 to make room for to possibilities:
  9. + * 1 - an extra terminating zero
  10. + * 2 - an extra slash (in case a syntax like "www.host.com?moo" is used)
  11. + */
  12. +
  13. + conn->pathbuffer=(char *)malloc(urllen+3);
  14. if(NULL == conn->pathbuffer)
  15. return CURLE_OUT_OF_MEMORY; /* really bad error */
  16. conn->path = conn->pathbuffer;
  17. - conn->host.rawalloc=(char *)malloc(urllen);
  18. + conn->host.rawalloc=(char *)malloc(urllen+3);
  19. if(NULL == conn->host.rawalloc)
  20. return CURLE_OUT_OF_MEMORY;
  21. conn->host.name = conn->host.rawalloc;