Skip to content
  1. Oct 31, 2016
  2. Oct 30, 2016
    • Daniel Stenberg's avatar
      INTERNALS: better markdown · 13f49133
      Daniel Stenberg authored
      words with underscore need to be within `these`
      
      Bug: https://github.com/curl/curl-www/issues/19
      Reported-by : Jay Satiro
      13f49133
    • Jay Satiro's avatar
      mk-ca-bundle.vbs: Fix UTF-8 output · 2e750ce4
      Jay Satiro authored
      - Change initial message box to mention delay when downloading/parsing.
      
      Since there is no progress meter it was somewhat unexpected that after
      choosing a filename nothing appears to happen, when actually the cert
      data is in the process of being downloaded and parsed.
      
      - Warn if OpenSSL is not present.
      
      - Use a UTF-8 stream to make the ca-bundle data.
      
      - Save the UTF-8 ca-bundle stream as binary so that no BOM is added.
      
      ---
      
      This is a follow-up to d2c6d156 which switched mk-ca-bundle.vbs output to
      ANSI due to corrupt UTF-8 output, now fixed.
      
      This change completes making the default certificate bundle output of
      mk-ca-bundle.vbs as close as possible to that of mk-ca-bundle.pl, which
      should make it easier to review any difference between their output.
      
      Ref: https://github.com/curl/curl/pull/1012
      2e750ce4
  3. Oct 28, 2016
  4. Oct 27, 2016
  5. Oct 26, 2016
  6. Oct 25, 2016
    • Martin Frodl's avatar
      nss: fix tight loop in non-blocking TLS handhsake over proxy · eb84412b
      Martin Frodl authored
      ... in case the handshake completes before entering
      CURLM_STATE_PROTOCONNECT
      
      Bug: https://bugzilla.redhat.com/1388162
      eb84412b
    • Jay Satiro's avatar
      mk-ca-bundle: Update the vbscript version · d2c6d156
      Jay Satiro authored
      Bring the VBScript version more in line with the perl version:
      
      - Change timestamp to UTC.
      
      - Change URL retrieval to HTTPS-only by default.
      
      - Comment out the options that disabled SSL cert checking by default.
      
      - Assume OpenSSL is present, get SHA256. And add a flag to toggle it.
      
      - Fix cert issuer name output.
      
      The cert issuer output is now ansi, converted from UTF-8. Prior to this
      it was corrupt UTF-8. It turns out though we can work with UTF-8 the
      FSO object that writes ca-bundle can't write UTF-8, so there will have
      to be some alternative if UTF-8 is needed (like an ADODB.Stream).
      
      - Disable the certificate text info feature.
      
      The certificate text info doesn't work properly with any recent OpenSSL.
      d2c6d156
  7. Oct 24, 2016
  8. Oct 23, 2016
  9. Oct 22, 2016
    • Daniel Stenberg's avatar
      multi: force connections to get closed in close_all_connections · 6290c3c2
      Daniel Stenberg authored
      Several independent reports on infinite loops hanging in the
      close_all_connections() function when closing a multi handle, can be
      fixed by first marking the connection to get closed before calling
      Curl_disconnect.
      
      This is more fixing-the-symptom rather than the underlying problem
      though.
      
      Bug: https://curl.haxx.se/mail/lib-2016-10/0011.html
      Bug: https://curl.haxx.se/mail/lib-2016-10/0059.html
      
      Reported-by: Dan Fandrich, Valentin David, Miloš Ljumović
      6290c3c2
    • Anders Bakken's avatar
      curl_multi_remove_handle: fix a double-free · 406506ca
      Anders Bakken authored
      In short the easy handle needs to be disconnected from its connection at
      this point since the connection still is serving other easy handles.
      
      In our app we can reliably reproduce a crash in our http2 stress test
      that is fixed by this change. I can't easily reproduce the same test in
      a small example.
      
      This is the gdb/asan output:
      
      ==11785==ERROR: AddressSanitizer: heap-use-after-free on address 0xe9f4fb80 at pc 0x09f41f19 bp 0xf27be688 sp 0xf27be67c
      READ of size 4 at 0xe9f4fb80 thread T13 (RESOURCE_HTTP)
          #0 0x9f41f18 in curl_multi_remove_handle /path/to/source/3rdparty/curl/lib/multi.c:666
      
      0xe9f4fb80 is located 0 bytes inside of 1128-byte region [0xe9f4fb80,0xe9f4ffe8)
      freed by thread T13 (RESOURCE_HTTP) here:
          #0 0xf7b1b5c2 in __interceptor_free /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_malloc_linux.cc:45
          #1 0x9f7862d in conn_free /path/to/source/3rdparty/curl/lib/url.c:2808
          #2 0x9f78c6a in Curl_disconnect /path/to/source/3rdparty/curl/lib/url.c:2876
          #3 0x9f41b09 in multi_done /path/to/source/3rdparty/curl/lib/multi.c:615
          #4 0x9f48017 in multi_runsingle /path/to/source/3rdparty/curl/lib/multi.c:1896
          #5 0x9f490f1 in curl_multi_perform /path/to/source/3rdparty/curl/lib/multi.c:2123
          #6 0x9c4443c in perform /path/to/source/src/net/resourcemanager/ResourceManagerCurlThread.cpp:854
          #7 0x9c445e0 in ...
          #8 0x9c4cf1d in ...
          #9 0xa2be6b5 in ...
          #10 0xf7aa5780 in asan_thread_start /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
          #11 0xf4d3a16d in __clone (/lib/i386-linux-gnu/libc.so.6+0xe716d)
      
      previously allocated by thread T13 (RESOURCE_HTTP) here:
          #0 0xf7b1ba27 in __interceptor_calloc /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_malloc_linux.cc:70
          #1 0x9f7dfa6 in allocate_conn /path/to/source/3rdparty/curl/lib/url.c:3904
          #2 0x9f88ca0 in create_conn /path/to/source/3rdparty/curl/lib/url.c:5797
          #3 0x9f8c928 in Curl_connect /path/to/source/3rdparty/curl/lib/url.c:6438
          #4 0x9f45a8c in multi_runsingle /path/to/source/3rdparty/curl/lib/multi.c:1411
          #5 0x9f490f1 in curl_multi_perform /path/to/source/3rdparty/curl/lib/multi.c:2123
          #6 0x9c4443c in perform /path/to/source/src/net/resourcemanager/ResourceManagerCurlThread.cpp:854
          #7 0x9c445e0 in ...
          #8 0x9c4cf1d in ...
          #9 0xa2be6b5 in ...
          #10 0xf7aa5780 in asan_thread_start /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
          #11 0xf4d3a16d in __clone (/lib/i386-linux-gnu/libc.so.6+0xe716d)
      
      SUMMARY: AddressSanitizer: heap-use-after-free /path/to/source/3rdparty/curl/lib/multi.c:666 in curl_multi_remove_handle
      Shadow bytes around the buggy address:
        0x3d3e9f20: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9f30: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9f40: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9f50: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa
        0x3d3e9f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
      =>0x3d3e9f70:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9f80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9f90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9fa0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9fb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
        0x3d3e9fc0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
      Shadow byte legend (one shadow byte represents 8 application bytes):
        Addressable:           00
        Partially addressable: 01 02 03 04 05 06 07
        Heap left redzone:       fa
        Heap right redzone:      fb
        Freed heap region:       fd
        Stack left redzone:      f1
        Stack mid redzone:       f2
        Stack right redzone:     f3
        Stack partial redzone:   f4
        Stack after return:      f5
        Stack use after scope:   f8
        Global redzone:          f9
        Global init order:       f6
        Poisoned by user:        f7
        Container overflow:      fc
        Array cookie:            ac
        Intra object redzone:    bb
        ASan internal:           fe
        Left alloca redzone:     ca
        Right alloca redzone:    cb
      ==11785==ABORTING
      
      Thread 14 "RESOURCE_HTTP" received signal SIGABRT, Aborted.
      [Switching to Thread 0xf27bfb40 (LWP 12324)]
      0xf7fd8be9 in __kernel_vsyscall ()
       (gdb) bt
       #0  0xf7fd8be9 in __kernel_vsyscall ()
       #1  0xf4c7ee89 in __GI_raise (sig=6) at ../sysdeps/unix/sysv/linux/raise.c:54
       #2  0xf4c803e7 in __GI_abort () at abort.c:89
       #3  0xf7b2ef2e in __sanitizer::Abort () at /opt/toolchain/src/gcc-6.2.0/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cc:122
       #4  0xf7b262fa in __sanitizer::Die () at /opt/toolchain/src/gcc-6.2.0/libsanitizer/sanitizer_common/sanitizer_common.cc:145
       #5  0xf7b21ab3 in __asan::ScopedInErrorReport::~ScopedInErrorReport (this=0xf27be171, __in_chrg=<optimized out>) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_report.cc:689
       #6  0xf7b214a5 in __asan::ReportGenericError (pc=166993689, bp=4068206216, sp=4068206204, addr=3925146496, is_write=false, access_size=4, exp=0, fatal=true) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_report.cc:1074
       #7  0xf7b21fce in __asan::__asan_report_load4 (addr=3925146496) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_rtl.cc:129
       #8  0x09f41f19 in curl_multi_remove_handle (multi=0xf3406080, data=0xde582400) at /path/to/source3rdparty/curl/lib/multi.c:666
       #9  0x09f6b277 in Curl_close (data=0xde582400) at /path/to/source3rdparty/curl/lib/url.c:415
       #10 0x09f3354e in curl_easy_cleanup (data=0xde582400) at /path/to/source3rdparty/curl/lib/easy.c:860
       #11 0x09c6de3f in ...
       #12 0x09c378c5 in ...
       #13 0x09c48133 in ...
       #14 0x09c4d092 in ...
       #15 0x0a2be6b6 in ...
       #16 0xf7aa5781 in asan_thread_start (arg=0xf2d22938) at /opt/toolchain/src/gcc-6.2.0/libsanitizer/asan/asan_interceptors.cc:226
       #17 0xf5de52b5 in start_thread (arg=0xf27bfb40) at pthread_create.c:333
       #18 0xf4d3a16e in clone () at ../sysdeps/unix/sysv/linux/i386/clone.S:114
      
      Fixes #1083
      406506ca
    • Daniel Stenberg's avatar
      fc458679
    • Daniel Stenberg's avatar
      testcurl.1: update URLs · a84e0713
      Daniel Stenberg authored
      a84e0713