- Pawel Kierski pointed out a mistake in the cookie code that could lead to a

bad fclose() after a fatal error had occured.
  (http://curl.haxx.se/bug/view.cgi?id=2382219)
This commit is contained in:
Daniel Stenberg 2008-12-03 15:08:09 +00:00
parent 04ee89493e
commit 58ebde9502
3 changed files with 9 additions and 2 deletions

View File

@ -6,6 +6,11 @@
Changelog
Daniel Fandrich (3 Dec 2008)
- Pawel Kierski pointed out a mistake in the cookie code that could lead to a
bad fclose() after a fatal error had occured.
(http://curl.haxx.se/bug/view.cgi?id=2382219)
Daniel Fandrich (25 Nov 2008)
- If a HTTP request is Basic and num is already >=1000, the HTTP test
server adds 1 to num to get the data section to return. This allows

View File

@ -22,6 +22,7 @@ This release includes the following bugfixes:
o memory leak with HTTP GSS/kerberos authentication
o removed the default use of "Pragma: no-cache"
o fix SCP/SFTP busyloop by using a new libssh2 0.19 function
o bad fclose() after a fatal error in cookie code
This release includes the following known bugs:
@ -31,6 +32,6 @@ This release would not have looked like this without help, code, reports and
advice from friends like these:
Yang Tse, Daniel Fandrich, Jim Meyering, Christian Krause, Andreas Wurf,
Markus Koetter, Josef Wolf, Vlad Grachov
Markus Koetter, Josef Wolf, Vlad Grachov, Pawel Kierski
Thanks! (and sorry if I forgot to mention someone)

View File

@ -1003,7 +1003,8 @@ int Curl_cookie_output(struct CookieInfo *c, const char *dumphere)
format_ptr = get_netscape_format(co);
if(format_ptr == NULL) {
fprintf(out, "#\n# Fatal libcurl error\n");
fclose(out);
if(!use_stdout)
fclose(out);
return 1;
}
fprintf(out, "%s\n", format_ptr);