diff options
| author | Daniel Stenberg <daniel@haxx.se> | 2018-03-24 23:47:41 +0100 | 
|---|---|---|
| committer | Daniel Stenberg <daniel@haxx.se> | 2018-05-14 07:40:31 +0200 | 
| commit | 8c7b3737d29ed5c0575bf592063de8a51450812d (patch) | |
| tree | 6b5b9129617c308bee42ae6ea34c85b8ebafd562 | |
| parent | 1b55d270ad3d4473b2fd46481478275e47c60eaf (diff) | |
http: restore buffer pointer when bad response-line is parsed
... leaving the k->str could lead to buffer over-reads later on.
CVE: CVE-2018-1000301
Assisted-by: Max Dymond
Detected by OSS-Fuzz.
Bug: https://curl.haxx.se/docs/adv_2018-b138.html
Bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7105
| -rw-r--r-- | lib/http.c | 6 | 
1 files changed, 5 insertions, 1 deletions
diff --git a/lib/http.c b/lib/http.c index 1a313b4fb..e080ae513 100644 --- a/lib/http.c +++ b/lib/http.c @@ -3014,6 +3014,8 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,  {    CURLcode result;    struct SingleRequest *k = &data->req; +  ssize_t onread = *nread; +  char *ostr = k->str;    /* header line within buffer loop */    do { @@ -3078,7 +3080,9 @@ CURLcode Curl_http_readwrite_headers(struct Curl_easy *data,          else {            /* this was all we read so it's all a bad header */            k->badheader = HEADER_ALLBAD; -          *nread = (ssize_t)rest_length; +          *nread = onread; +          k->str = ostr; +          return CURLE_OK;          }          break;        }  | 
