fa86d32d | 18-Feb-2019 |
Patrick Monnerat |
x509asn1: replace single char with an array Although safe in this context, using a single char as an array may cause invalid accesses to adjacent memory locations. Detected by C
x509asn1: replace single char with an array Although safe in this context, using a single char as an array may cause invalid accesses to adjacent memory locations. Detected by Coverity.
show more ...
|
af143ef4 | 18-Feb-2019 |
Daniel Stenberg |
examples/http2-serverpush: add some sensible error checks To avoid NULL pointer dereferences etc in the case of problems. Closes #3580 |
f26bc29c | 16-Feb-2019 |
Jay Satiro |
easy: fix win32 init to work without CURL_GLOBAL_WIN32 - Change the behavior of win32_init so that the required initialization procedures are not affected by CURL_GLOBAL_WIN32 flag.
easy: fix win32 init to work without CURL_GLOBAL_WIN32 - Change the behavior of win32_init so that the required initialization procedures are not affected by CURL_GLOBAL_WIN32 flag. libcurl via curl_global_init supports initializing for win32 with an optional flag CURL_GLOBAL_WIN32, which if omitted was meant to stop Winsock initialization. It did so internally by skipping win32_init() when that flag was set. Since then win32_init() has been expanded to include required initialization routines that are separate from Winsock and therefore must be called in all cases. This commit fixes it so that CURL_GLOBAL_WIN32 only controls the optional win32 initialization (which is Winsock initialization, according to our doc). The only users affected by this change are those that don't pass CURL_GLOBAL_WIN32 to curl_global_init. For them this commit removes the risk of a potential crash. Ref: https://github.com/curl/curl/pull/3573 Fixes https://github.com/curl/curl/issues/3313 Closes https://github.com/curl/curl/pull/3575
show more ...
|
e6522522 | 16-Feb-2019 |
Daniel Gustafsson |
cookie: Add support for cookie prefixes The draft-ietf-httpbis-rfc6265bis-02 draft, specify a set of prefixes and how they should affect cookie initialization, which has been adopted
cookie: Add support for cookie prefixes The draft-ietf-httpbis-rfc6265bis-02 draft, specify a set of prefixes and how they should affect cookie initialization, which has been adopted by the major browsers. This adds support for the two prefixes defined, __Host- and __Secure, and updates the testcase with the supplied examples from the draft. Closes #3554 Reviewed-by: Daniel Stenberg <daniel@haxx.se>
show more ...
|
0299b262 | 16-Feb-2019 |
Daniel Gustafsson |
mbedtls: release sessionid resources on error If mbedtls_ssl_get_session() fails, it may still have allocated memory that needs to be freed to avoid leaking. Call the library API fun
mbedtls: release sessionid resources on error If mbedtls_ssl_get_session() fails, it may still have allocated memory that needs to be freed to avoid leaking. Call the library API function to release session resources on this errorpath as well as on Curl_ssl_addsessionid() errors. Closes: #3574 Reported-by: Michał Antoniak <M.Antoniak@posnet.com> Reviewed-by: Daniel Stenberg <daniel@haxx.se>
show more ...
|
188036ca | 16-Feb-2019 |
Patrick Monnerat |
cli tool: refactor encoding conversion sequence for switch case fallthrough. |
c52620c2 | 15-Feb-2019 |
Patrick Monnerat |
version.c: silent scan-build even when librtmp is not enabled |
5d58a7fb | 15-Feb-2019 |
Daniel Stenberg |
RELEASE-NOTES: synced |
ca597ad3 | 14-Feb-2019 |
Daniel Stenberg |
Curl_now: figure out windows version in win32_init ... and avoid use of static variables that aren't thread safe. Fixes regression from e9ababd4f5a (present in the 7.64.0 release)
Curl_now: figure out windows version in win32_init ... and avoid use of static variables that aren't thread safe. Fixes regression from e9ababd4f5a (present in the 7.64.0 release) Reported-by: Paul Groke Fixes #3572 Closes #3573
show more ...
|
208c7771 | 14-Feb-2019 |
Marcel Raad |
unit1307: just fail without FTP support I missed to check this in with commit 71786c0505926aaf7e9b2477b2fb7ee16a915ec6, which only disabled the test. This fixes the actual linker err
unit1307: just fail without FTP support I missed to check this in with commit 71786c0505926aaf7e9b2477b2fb7ee16a915ec6, which only disabled the test. This fixes the actual linker error. Closes https://github.com/curl/curl/pull/3568
show more ...
|
9e08b415 | 14-Feb-2019 |
Daniel Stenberg |
travis: enable valgrind for the iconv tests too Closes #3571 |
8ae3db51 | 20-Nov-2017 |
Daniel Stenberg |
travis: add scan-build Closes #3564 |
5341c656 | 14-Feb-2019 |
Daniel Stenberg |
examples/sftpuploadresume: Value stored to 'result' is never read Detected by scan-build |
25233d94 | 14-Feb-2019 |
Daniel Stenberg |
examples/http2-upload: cleaned up Fix scan-build warnings, no globals, no silly handle scan. Also remove handles from the multi before cleaning up. |
b2e5af4a | 14-Feb-2019 |
Daniel Stenberg |
examples/http2-download: cleaned up To avoid scan-build warnings and global variables. |
52d98194 | 14-Feb-2019 |
Daniel Stenberg |
examples/postinmemory: Potential leak of memory pointed to by 'chunk.memory' Detected by scan-build |
9bd704c0 | 14-Feb-2019 |
Daniel Stenberg |
examples/httpcustomheader: Value stored to 'res' is never read Detected by scan-build |
b4beb3b1 | 14-Feb-2019 |
Daniel Stenberg |
examples: remove superfluous null-pointer checks in ftpget, ftpsget and sftpget, so that scan-build stops warning for potential NULL pointer dereference below! Detected by scan-
examples: remove superfluous null-pointer checks in ftpget, ftpsget and sftpget, so that scan-build stops warning for potential NULL pointer dereference below! Detected by scan-build
show more ...
|
354aa328 | 13-Feb-2019 |
Daniel Stenberg |
strip_trailing_dot: make sure NULL is never used for strlen scan-build warning: Null pointer passed as an argument to a 'nonnull' parameter |
4015fae0 | 12-Feb-2019 |
Jay Satiro |
connection_check: restore original conn->data after the check - Save the original conn->data before it's changed to the specified data transfer for the connection check and then restor
connection_check: restore original conn->data after the check - Save the original conn->data before it's changed to the specified data transfer for the connection check and then restore it afterwards. This is a follow-up to 38d8e1b 2019-02-11. History: It was discovered a month ago that before checking whether to extract a dead connection that that connection should be associated with a "live" transfer for the check (ie original conn->data ignored and set to the passed in data). A fix was landed in 54b201b which did that and also cleared conn->data after the check. The original conn->data was not restored, so presumably it was thought that a valid conn->data was no longer needed. Several days later it was discovered that a valid conn->data was needed after the check and follow-up fix was landed in bbae24c which partially reverted the original fix and attempted to limit the scope of when conn->data was changed to only when pruning dead connections. In that case conn->data was not cleared and the original conn->data not restored. A month later it was discovered that the original fix was somewhat correct; a "live" transfer is needed for the check in all cases because original conn->data could be null which could cause a bad deref at arbitrary points in the check. A fix was landed in 38d8e1b which expanded the scope to all cases. conn->data was not cleared and the original conn->data not restored. A day later it was discovered that not restoring the original conn->data may lead to busy loops in applications that use the event interface, and given this observation it's a pretty safe assumption that there is some code path that still needs the original conn->data. This commit is the follow-up fix for that, it restores the original conn->data after the connection check. Assisted-by: tholin@users.noreply.github.com Reported-by: tholin@users.noreply.github.com Fixes https://github.com/curl/curl/issues/3542 Closes #3559
show more ...
|
49d73d40 | 14-Feb-2019 |
Daniel Stenberg |
memdebug: bring back curl_mark_sclose Used by debug builds with NSS. Reverted from 05b100aee247bb |
539d17b0 | 14-Feb-2019 |
Patrick Monnerat |
transfer.c: do not compute length of undefined hex buffer. On non-ascii platforms, the chunked hex header was measured for char code conversion length, even for chunked trailers that do
transfer.c: do not compute length of undefined hex buffer. On non-ascii platforms, the chunked hex header was measured for char code conversion length, even for chunked trailers that do not have an hex header. In addition, the efective length is already known: use it. Since the hex length can be zero, only convert if needed. Reported by valgrind.
show more ...
|
a75de9de | 14-Feb-2019 |
Daniel Stenberg |
KNOWN_BUGS: Cannot compile against a static build of OpenLDAP Closes #2367 |
489ef6b6 | 14-Feb-2019 |
Patrick Monnerat |
x509asn1: "Dereference of null pointer" Detected by scan-build (false positive). |
ad373686 | 14-Feb-2019 |
Daniel Stenberg |
configure: show features as well in the final summary Closes #3569 |