From: Daniel Stenberg Date: Thu, 8 Mar 2018 09:33:16 +0000 (+0100) Subject: readwrite: make sure excess reads don't go beyond buffer end X-Git-Tag: curl-7_59_0~13 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=d52dc4760f6d9ca1937eefa2093058a952465128;p=curl readwrite: make sure excess reads don't go beyond buffer end CVE-2018-1000122 Bug: https://curl.haxx.se/docs/adv_2018-b047.html Detected by OSS-fuzz --- diff --git a/lib/transfer.c b/lib/transfer.c index c46ac25f4..fd9af3155 100644 --- a/lib/transfer.c +++ b/lib/transfer.c @@ -808,10 +808,15 @@ static CURLcode readwrite_data(struct Curl_easy *data, } /* if(!header and data to read) */ - if(conn->handler->readwrite && - (excess > 0 && !conn->bits.stream_was_rewound)) { + if(conn->handler->readwrite && excess && !conn->bits.stream_was_rewound) { /* Parse the excess data */ k->str += nread; + + if(&k->str[excess] > &k->buf[data->set.buffer_size]) { + /* the excess amount was too excessive(!), make sure + it doesn't read out of buffer */ + excess = &k->buf[data->set.buffer_size] - k->str; + } nread = (ssize_t)excess; result = conn->handler->readwrite(data, conn, &nread, &readmore);