Package: curl / 7.64.0-4+deb10u2
Metadata
Package | Version | Patches format |
---|---|---|
curl | 7.64.0-4+deb10u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
04_workaround_as_needed_bug.patch | (download) |
ltmain.sh |
14 14 + 0 - 0 ! |
work around libtool --as-needed reordering bug |
06_always disable valgrind.patch | (download) |
tests/Makefile.am |
2 1 + 1 - 0 ! |
always disable valgrind tests |
07_do not disable debug symbols.patch | (download) |
m4/curl-compilers.m4 |
11 0 + 11 - 0 ! |
do not disable debug symbols without --enable-debug |
08_enable zsh.patch | (download) |
Makefile.am |
4 2 + 2 - 0 ! |
enable zsh completion generation |
11_omit directories from config.patch | (download) |
curl-config.in |
15 3 + 12 - 0 ! |
in order to (partially) multi-arch-ify curl-config, remove all mention of @includedir@ and @libdir@ from the script. On Debian, the actual header and library directories are architecture-dependent, but will always be in the C compiler's default search path, so -I and -L options are not necessary (and may be harmful in multi-arch environments.) |
12_zsh.patch | (download) |
scripts/zsh.pl |
5 4 + 1 - 0 ! |
fixes for zsh completion generator |
13_singlesocket fix the sincebefore placement.patch | (download) |
lib/multi.c |
4 2 + 2 - 0 ! |
[patch] singlesocket: fix the 'sincebefore' placement The variable wasn't properly reset within the loop and thus could remain set for sockets that hadn't been set before and miss notifying the app. This is a follow-up to 4c35574 (shipped in curl 7.64.0) Reported-by: buzo-ffm on github Detected-by: Jan Alexander Steffens Fixes #3585 Closes #3589 |
14_connection_check set data to the transfer doing the .patch | (download) |
lib/url.c |
1 1 + 0 - 0 ! |
[patch] connection_check: set ->data to the transfer doing the check The http2 code for connection checking needs a transfer to use. Make sure a working one is set before handler->connection_check() is called. Reported-by: jnbr on github Fixes #3541 Closes #3547 |
15_connection_check restore original conn data after th.patch | (download) |
lib/url.c |
3 2 + 1 - 0 ! |
[patch] connection_check: restore original conn->data after the check - Save the original conn->data before it's changed to the specified data transfer for the connection check and then restore it afterwards. This is a follow-up to 38d8e1b 2019-02-11. History: It was discovered a month ago that before checking whether to extract a dead connection that that connection should be associated with a "live" transfer for the check (ie original conn->data ignored and set to the passed in data). A fix was landed in 54b201b which did that and also cleared conn->data after the check. The original conn->data was not restored, so presumably it was thought that a valid conn->data was no longer needed. Several days later it was discovered that a valid conn->data was needed after the check and follow-up fix was landed in bbae24c which partially reverted the original fix and attempted to limit the scope of when conn->data was changed to only when pruning dead connections. In that case conn->data was not cleared and the original conn->data not restored. A month later it was discovered that the original fix was somewhat correct; a "live" transfer is needed for the check in all cases because original conn->data could be null which could cause a bad deref at arbitrary points in the check. A fix was landed in 38d8e1b which expanded the scope to all cases. conn->data was not cleared and the original conn->data not restored. A day later it was discovered that not restoring the original conn->data may lead to busy loops in applications that use the event interface, and given this observation it's a pretty safe assumption that there is some code path that still needs the original conn->data. This commit is the follow-up fix for that, it restores the original conn->data after the connection check. Assisted-by: tholin@users.noreply.github.com Reported-by: tholin@users.noreply.github.com Fixes https://github.com/curl/curl/issues/3542 Closes #3559 |
16_tftp use the current blksize for recvfrom.patch | (download) |
lib/tftp.c |
2 1 + 1 - 0 ! |
[patch] tftp: use the current blksize for recvfrom() bug: https://curl.haxx.se/docs/CVE-2019-5436.html Reported-by: l00p3r on hackerone CVE-2019-5436 |
17_CURL_MAX_INPUT_LENGTH largest acceptable string inpu.patch | (download) |
lib/setopt.c |
7 7 + 0 - 0 ! |
[patch] curl_max_input_length: largest acceptable string input size This limits all accepted input strings passed to libcurl to be less than CURL_MAX_INPUT_LENGTH (8000000) bytes, for these API calls: curl_easy_setopt() and curl_url_set(). The 8000000 number is arbitrary picked and is meant to detect mistakes or abuse, not to limit actual practical use cases. By limiting the acceptable string lengths we also reduce the risk of integer overflows all over. NOTE: This does not apply to `CURLOPT_POSTFIELDS`. Test 1559 verifies. Closes #3805 |
18_CVE 2019 5481.patch | (download) |
lib/security.c |
6 2 + 4 - 0 ! |
[patch] security:read_data fix bad realloc() ... that could end up a double-free CVE-2019-5481 Bug: https://curl.haxx.se/docs/CVE-2019-5481.html |
19_CVE 2019 5482.patch | (download) |
lib/tftp.c |
12 9 + 3 - 0 ! |
[patch] tftp: alloc maximum blksize, and use default unless oack is received Fixes potential buffer overflow from 'recvfrom()', should the server return an OACK without blksize. Bug: https://curl.haxx.se/docs/CVE-2019-5482.html CVE-2019-5482 |
20_CVE 2020 8169.patch | (download) |
lib/url.c |
6 4 + 2 - 0 ! |
[patch] url: make the updated credentials url-encoded in the url Found-by: Gregory Jefferis Reported-by: Jeroen Ooms Added test 1168 to verify. Bug spotted when doing a redirect. Bug: https://github.com/jeroen/curl/issues/224 Closes #5400 |
21_CVE 2020 8177.patch | (download) |
src/tool_cb_hdr.c |
22 4 + 18 - 0 ! |
[patch] tool_getparam: -i is not ok if -j is used Reported-by: sn on hackerone Bug: https://curl.haxx.se/docs/CVE-2020-8177.html |
22_CVE 2020 8231.patch | (download) |
lib/connect.c |
19 10 + 9 - 0 ! |
[patch] curl_easy: remember last connection by id, not by pointer CVE-2020-8231 Bug: https://curl.haxx.se/docs/CVE-2020-8231.html Reported-by: Marc Aldorasi Closes #5824 |
23_CVE 2020 8284.patch | (download) |
docs/cmdline-opts/ftp-skip-pasv-ip.d |
2 2 + 0 - 0 ! |
[patch] ftp: curlopt_ftp_skip_pasv_ip by default The command line tool also independently sets --ftp-skip-pasv-ip by default. Ten test cases updated to adapt the modified --libcurl output. Bug: https://curl.se/docs/CVE-2020-8284.html CVE-2020-8284 Reported-by: Varnavas Papaioannou |
24_CVE 2020 8285.patch | (download) |
lib/ftp.c |
211 107 + 104 - 0 ! |
[patch] ftp: make wc_statemach loop instead of recurse CVE-2020-8285 Fixes #6255 Bug: https://curl.se/docs/CVE-2020-8285.html Reported-by: xnynx on github |
25_CVE 2020 8286.patch | (download) |
lib/vtls/openssl.c |
94 60 + 34 - 0 ! |
[patch] openssl: make the ocsp verification verify the certificate id CVE-2020-8286 Reported by anonymous Bug: https://curl.se/docs/CVE-2020-8286.html |
26_CVE 2021 22876.patch | (download) |
lib/transfer.c |
25 23 + 2 - 0 ! |
[patch] transfer: strip credentials from the auto-referer header field Added test 2081 to verify. CVE-2021-22876 Bug: https://curl.se/docs/CVE-2021-22876.html |
27_CVE 2021 22890.patch | (download) |
lib/vtls/gtls.c |
13 9 + 4 - 0 ! |
[patch] vtls: add 'isproxy' argument to curl_ssl_get/addsessionid() To make sure we set and extract the correct session. Reported-by: Mingtao Yang Bug: https://curl.se/docs/CVE-2021-22890.html CVE-2021-22890 |
90_gnutls.patch | (download) |
docs/examples/Makefile.am |
4 2 + 2 - 0 ! |
build with gnutls. |
99_nss.patch | (download) |
docs/examples/Makefile.am |
4 2 + 2 - 0 ! |
build with nss. |