Bug 1478316 (CVE-2017-1000099)

Summary: CVE-2017-1000099 curl: FILE buffer read out of bounds
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: omajid, sardella, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: curl 7.55.0 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-11-12 09:37:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1479669, 1479670    
Bug Blocks:    
Description Flags
Upstream patch none

Description Adam Mariš 2017-08-04 09:36:59 UTC
When asking to get a file from a file:// URL, libcurl provides a feature that
outputs meta-data about the file using HTTP-like headers.

The code doing this would send the wrong buffer to the user (stdout or the
application's provide callback), which could lead to other private data from
the heap to get inadvertently displayed.

The wrong buffer was an uninitialized memory area allocated on the heap and if
it turned out to not contain any zero byte, it would continue and display the
data following that buffer in memory.

Affected versions: libcurl 7.54.1

Comment 1 Adam Mariš 2017-08-04 09:37:02 UTC

Name: the Curl project
Upstream: Even Rouault

Comment 2 Adam Mariš 2017-08-04 09:45:49 UTC
Created attachment 1308974 [details]
Upstream patch

Comment 3 Andrej Nemec 2017-08-09 06:23:43 UTC
External References:


Comment 4 Andrej Nemec 2017-08-09 06:31:28 UTC
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 1479670]

Created mingw-curl tracking bugs for this issue:

Affects: fedora-all [bug 1479669]