History log of /curl/ (Results 6676 – 6700 of 33763)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
3193170430-Apr-2021 Kamil Dudka

http2: fix resource leaks in set_transfer_url()

... detected by Coverity:

Error: RESOURCE_LEAK (CWE-772):
lib/http2.c:480: alloc_fn: Storage is returned from allocation function

http2: fix resource leaks in set_transfer_url()

... detected by Coverity:

Error: RESOURCE_LEAK (CWE-772):
lib/http2.c:480: alloc_fn: Storage is returned from allocation function "curl_url". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:480: var_assign: Assigning: "u" = storage returned from "curl_url()".
lib/http2.c:486: noescape: Resource "u" is not freed or pointed-to in "curl_url_set". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:488: leaked_storage: Variable "u" going out of scope leaks the storage it points to.

Error: RESOURCE_LEAK (CWE-772):
lib/http2.c:480: alloc_fn: Storage is returned from allocation function "curl_url". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:480: var_assign: Assigning: "u" = storage returned from "curl_url()".
lib/http2.c:493: noescape: Resource "u" is not freed or pointed-to in "curl_url_set". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:495: leaked_storage: Variable "u" going out of scope leaks the storage it points to.

Error: RESOURCE_LEAK (CWE-772):
lib/http2.c:480: alloc_fn: Storage is returned from allocation function "curl_url". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:480: var_assign: Assigning: "u" = storage returned from "curl_url()".
lib/http2.c:500: noescape: Resource "u" is not freed or pointed-to in "curl_url_set". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:502: leaked_storage: Variable "u" going out of scope leaks the storage it points to.

Error: RESOURCE_LEAK (CWE-772):
lib/http2.c:480: alloc_fn: Storage is returned from allocation function "curl_url". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:480: var_assign: Assigning: "u" = storage returned from "curl_url()".
lib/http2.c:505: noescape: Resource "u" is not freed or pointed-to in "curl_url_get". [Note: The source code implementation of the function has been overridden by a builtin model.]
lib/http2.c:507: leaked_storage: Variable "u" going out of scope leaks the storage it points to.

Closes #6986

show more ...

8228002c25-Apr-2021 Jacob Hoffman-Andrews

rustls: use ALPN

Update required rustls to 0.5.0

Closes #6960

ea17a02229-Apr-2021 MAntoniak <47522782+MAntoniak@users.noreply.github.com>

gskit: fix CURL_DISABLE_PROXY build

Removed localfd and remotefd from ssl_backend_data (ued only with proxy
connection). Function pipe_ssloverssl return always 0, when proxy is not
u

gskit: fix CURL_DISABLE_PROXY build

Removed localfd and remotefd from ssl_backend_data (ued only with proxy
connection). Function pipe_ssloverssl return always 0, when proxy is not
used.

Closes #6981

show more ...

71bffe7329-Apr-2021 MAntoniak <47522782+MAntoniak@users.noreply.github.com>

gskit: fix undefined reference to 'conn'

Closes #6980

a3268eca25-Apr-2021 Jacob Hoffman-Andrews

tls: add USE_HTTP2 define

This abstracts across the two HTTP/2 backends: nghttp2 and Hyper.

Add our own define for the "h2" ALPN protocol, so TLS backends can use
it without dep

tls: add USE_HTTP2 define

This abstracts across the two HTTP/2 backends: nghttp2 and Hyper.

Add our own define for the "h2" ALPN protocol, so TLS backends can use
it without depending on a specific HTTP backend.

Closes #6959

show more ...

5c932f8f27-Apr-2021 Jacob Hoffman-Andrews

lib: fix 0-length Curl_client_write calls

Closes #6954

f4b85d2424-Apr-2021 Jacob Hoffman-Andrews

lib: remove strlen call from Curl_client_write

At all call sites with an explicit 0 len, pass an appropriate nonzero
len.

Closes #6954

6aae7b1727-Apr-2021 Ayushman Singh Chauhan

docs: camelcase it like GitHub everywhere

Closes #6979

b088638227-Apr-2021 Lucas Servén Marín

docs: fix typo in fail-with-body doc

This commit fixes a small typo in the documentation for the
--fail-with-body flag.

Closes https://github.com/curl/curl/pull/6977

1d5d0ae923-Apr-2021 Jay Satiro

lib: fix some misuse of curlx_convert_UTF8_to_tchar

curlx_convert_UTF8_to_tchar must be freed by curlx_unicodefree, but
prior to this change some uses mistakenly called free.

I'

lib: fix some misuse of curlx_convert_UTF8_to_tchar

curlx_convert_UTF8_to_tchar must be freed by curlx_unicodefree, but
prior to this change some uses mistakenly called free.

I've reviewed all other uses of curlx_convert_UTF8_to_tchar and
curlx_convert_tchar_to_UTF8.

Bug: https://github.com/curl/curl/pull/6602#issuecomment-825236763
Reported-by: sergio-nsk@users.noreply.github.com

Closes https://github.com/curl/curl/pull/6938

show more ...

3e820fbf27-Apr-2021 Daniel Stenberg

ntlm: precaution against super huge type2 offsets

... which otherwise caused an integer overflow and circumvented the if()
conditional size check.

Detected by OSS-Fuzz
Bug:

ntlm: precaution against super huge type2 offsets

... which otherwise caused an integer overflow and circumvented the if()
conditional size check.

Detected by OSS-Fuzz
Bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33720
Assisted-by: Max Dymond
Closes #6975

show more ...

826c438c27-Apr-2021 Daniel Stenberg

c-hyper: fix unused variable ‘wrote’

2e23f3b826-Apr-2021 Daniel Stenberg

libcurl-security.3: be careful of setuid

Reported-by: Harry Sintonen
Closes #6970

76f33fd326-Apr-2021 Kevin Burke

c-hyper: don't write to set.writeheader if null

Previously if a caller set CURLOPT_WRITEFUNCTION but did not set a
CURLOPT_HEADERDATA buffer, Hyper would still attempt to write headers t

c-hyper: don't write to set.writeheader if null

Previously if a caller set CURLOPT_WRITEFUNCTION but did not set a
CURLOPT_HEADERDATA buffer, Hyper would still attempt to write headers to
the data->set.writeheader header buffer, even though it is null. This
led to NPE segfaults attempting to use libcurl+Hyper with Git, for
example.

Instead, process the client write for the status line using the same
logic we use to process the client write for the later HTTP headers,
which contains the appropriate guard logic. As a side benefit,
data->set.writeheader is now only read in one file instead of two.

Fixes #6619
Fixes abetterinternet/crustls#49
Fixes hyperium/hyper#2438
Closes #6971

show more ...

9fc2844226-Apr-2021 Daniel Stenberg

wolfssl: handle SSL_write() returns 0 for error

Reported-by: Timo Lange

Closes #6967

f154ae9d26-Apr-2021 Daniel Stenberg

easy: ignore sigpipe in curl_easy_send

Closes #6965

9ec1ef7f26-Apr-2021 Daniel Stenberg

sigpipe: ignore SIGPIPE when using wolfSSL as well

Closes #6966

7fdf01f323-Apr-2021 Daniel Stenberg

libcurl-security.3: don't try to filter IPv4 hosts based on the URL

Closes #6942

f2e1163b23-Apr-2021 Harry Sintonen

nss_set_blocking: avoid static for sock_opt

Reviewed-by: Kamil Dudka
Closes #6945

56e2319626-Apr-2021 Daniel Stenberg

RELEASE-NOTES: synced

c1311dba26-Apr-2021 Yusuke Nakamura

docs/HTTP3.md: fix nghttp2's HTTP/3 server port

Port 8443 does not work now.
Correct origin is in the quicwg's wiki.
https://github.com/quicwg/base-drafts/wiki/Implementations#ngtcp2

docs/HTTP3.md: fix nghttp2's HTTP/3 server port

Port 8443 does not work now.
Correct origin is in the quicwg's wiki.
https://github.com/quicwg/base-drafts/wiki/Implementations#ngtcp2

Closes #6964

show more ...

994af2a125-Apr-2021 Daniel Stenberg

krb5: don't use 'static' to store PBSZ size response

... because it makes the knowledge and usage cross-transfer in funny and
unexpected ways.

Reported-by: Harry Sintonen
Cl

krb5: don't use 'static' to store PBSZ size response

... because it makes the knowledge and usage cross-transfer in funny and
unexpected ways.

Reported-by: Harry Sintonen
Closes #6963

show more ...

9f71cc2924-Apr-2021 Kevin Burke

m4: add security frameworks on Mac when compiling rustls

Previously compiling rustls on Mac would only complete if you also
compiled the SecureTransport TLS backend, which curl would pre

m4: add security frameworks on Mac when compiling rustls

Previously compiling rustls on Mac would only complete if you also
compiled the SecureTransport TLS backend, which curl would prefer to
the Rust backend.

Appending these flags to LDFLAGS makes it possible to compile the
Rustls backend on Mac without the SecureTransport backend, which means
this patch will make it possible for Mac users to use the Rustls
backend for TLS.

Reviewed-by: Jacob Hoffman-Andrews

Fixes #6955
Cloes #6956

show more ...

7843fe0a23-Apr-2021 Daniel Stenberg

krb5: remove the unused 'overhead' function

Closes #6947

68f6c56324-Apr-2021 Johann150

curl_url_set.3: add memory management information

wording taken from man page for CURLOPT_URL.3

As far as I can see, the URL part is either malloc'ed before due to
encoding or i

curl_url_set.3: add memory management information

wording taken from man page for CURLOPT_URL.3

As far as I can see, the URL part is either malloc'ed before due to
encoding or it is strdup'ed.

Closes #6953

show more ...

1...<<261262263264265266267268269270>>...1351