summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/lighttpd
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@arm.com>2022-10-21 17:16:39 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-10-25 13:42:03 +0100
commit7deed5f7b1a8491f8706a460d333000eb1810778 (patch)
tree496f4690a7737e8784a7d4497bd4e6d63ce9f05e /meta/recipes-extended/lighttpd
parent5b62ac0a3c776cd277c47f083e1c3586dbea850d (diff)
downloadpoky-7deed5f7b1a8491f8706a460d333000eb1810778.tar.gz
lighttpd: fix CVE-2022-41556
Backport the fix from upstream to fix this CVE. (From OE-Core rev: 59f69125fb00dc8fd335f32fe6898e7a480141e4) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/lighttpd')
-rw-r--r--meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch31
-rw-r--r--meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb1
2 files changed, 32 insertions, 0 deletions
diff --git a/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch b/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch
new file mode 100644
index 0000000000..284a5a3ea9
--- /dev/null
+++ b/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch
@@ -0,0 +1,31 @@
1CVE: CVE-2022-41556
2Upstream-Status: Backport
3Signed-off-by: Ross Burton <ross.burton@arm.com>
4
5From b18de6f9264f914f7bf493abd3b6059343548e50 Mon Sep 17 00:00:00 2001
6From: Glenn Strauss <gstrauss@gluelogic.com>
7Date: Sun, 11 Sep 2022 22:31:34 -0400
8Subject: [PATCH] [core] handle RDHUP when collecting chunked body
9
10handle RDHUP as soon as RDHUP detected when collecting HTTP/1.1 chunked
11request body (and when not streaming request body to backend)
12
13x-ref:
14 https://github.com/lighttpd/lighttpd1.4/pull/115
15---
16 src/gw_backend.c | 2 +-
17 1 file changed, 1 insertion(+), 1 deletion(-)
18
19diff --git a/src/gw_backend.c b/src/gw_backend.c
20index df9d8217..5db56287 100644
21--- a/src/gw_backend.c
22+++ b/src/gw_backend.c
23@@ -2228,7 +2228,7 @@ handler_t gw_handle_subrequest(request_st * const r, void *p_d) {
24 * and module is flagged to stream request body to backend) */
25 return (r->conf.stream_request_body & FDEVENT_STREAM_REQUEST)
26 ? http_response_reqbody_read_error(r, 411)
27- : HANDLER_WAIT_FOR_EVENT;
28+ : (rc == HANDLER_GO_ON) ? HANDLER_WAIT_FOR_EVENT : rc;
29 }
30
31 if (hctx->wb_reqlen < -1 && r->reqbody_length >= 0) {
diff --git a/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb b/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb
index 801162867c..78978105b2 100644
--- a/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb
+++ b/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb
@@ -14,6 +14,7 @@ RRECOMMENDS:${PN} = "lighttpd-module-access \
14 lighttpd-module-accesslog" 14 lighttpd-module-accesslog"
15 15
16SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \ 16SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \
17 file://CVE-2022-41556.patch \
17 file://index.html.lighttpd \ 18 file://index.html.lighttpd \
18 file://lighttpd.conf \ 19 file://lighttpd.conf \
19 file://lighttpd \ 20 file://lighttpd \