6da3644
From 13de299b112a59c373b330f0539166ecc9a7627b Mon Sep 17 00:00:00 2001
6da3644
From: Daniel Stenberg <daniel@haxx.se>
6da3644
Date: Tue, 3 Sep 2019 22:59:32 +0200
6da3644
Subject: [PATCH] security:read_data fix bad realloc()
6da3644
6da3644
... that could end up a double-free
6da3644
6da3644
CVE-2019-5481
6da3644
Bug: https://curl.haxx.se/docs/CVE-2019-5481.html
6da3644
6da3644
Upstream-commit: 9069838b30fb3b48af0123e39f664cea683254a5
6da3644
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
6da3644
---
6da3644
 lib/security.c | 6 ++----
6da3644
 1 file changed, 2 insertions(+), 4 deletions(-)
6da3644
6da3644
diff --git a/lib/security.c b/lib/security.c
6da3644
index 550ea2d..c5e4e13 100644
6da3644
--- a/lib/security.c
6da3644
+++ b/lib/security.c
6da3644
@@ -191,7 +191,6 @@ static CURLcode read_data(struct connectdata *conn,
6da3644
                           struct krb5buffer *buf)
6da3644
 {
6da3644
   int len;
6da3644
-  void *tmp = NULL;
6da3644
   CURLcode result;
6da3644
 
6da3644
   result = socket_read(fd, &len, sizeof(len));
6da3644
@@ -201,12 +200,11 @@ static CURLcode read_data(struct connectdata *conn,
6da3644
   if(len) {
6da3644
     /* only realloc if there was a length */
6da3644
     len = ntohl(len);
6da3644
-    tmp = Curl_saferealloc(buf->data, len);
6da3644
+    buf->data = Curl_saferealloc(buf->data, len);
6da3644
   }
6da3644
-  if(tmp == NULL)
6da3644
+  if(!len || !buf->data)
6da3644
     return CURLE_OUT_OF_MEMORY;
6da3644
 
6da3644
-  buf->data = tmp;
6da3644
   result = socket_read(fd, buf->data, len);
6da3644
   if(result)
6da3644
     return result;
6da3644
-- 
6da3644
2.20.1
6da3644