diff options
author | Ross Burton <ross.burton@arm.com> | 2022-10-21 17:16:39 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-10-25 13:42:03 +0100 |
commit | 7deed5f7b1a8491f8706a460d333000eb1810778 (patch) | |
tree | 496f4690a7737e8784a7d4497bd4e6d63ce9f05e /meta/recipes-extended/lighttpd | |
parent | 5b62ac0a3c776cd277c47f083e1c3586dbea850d (diff) | |
download | poky-7deed5f7b1a8491f8706a460d333000eb1810778.tar.gz |
lighttpd: fix CVE-2022-41556
Backport the fix from upstream to fix this CVE.
(From OE-Core rev: 59f69125fb00dc8fd335f32fe6898e7a480141e4)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/lighttpd')
-rw-r--r-- | meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch | 31 | ||||
-rw-r--r-- | meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb | 1 |
2 files changed, 32 insertions, 0 deletions
diff --git a/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch b/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch new file mode 100644 index 0000000000..284a5a3ea9 --- /dev/null +++ b/meta/recipes-extended/lighttpd/lighttpd/CVE-2022-41556.patch | |||
@@ -0,0 +1,31 @@ | |||
1 | CVE: CVE-2022-41556 | ||
2 | Upstream-Status: Backport | ||
3 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
4 | |||
5 | From b18de6f9264f914f7bf493abd3b6059343548e50 Mon Sep 17 00:00:00 2001 | ||
6 | From: Glenn Strauss <gstrauss@gluelogic.com> | ||
7 | Date: Sun, 11 Sep 2022 22:31:34 -0400 | ||
8 | Subject: [PATCH] [core] handle RDHUP when collecting chunked body | ||
9 | |||
10 | handle RDHUP as soon as RDHUP detected when collecting HTTP/1.1 chunked | ||
11 | request body (and when not streaming request body to backend) | ||
12 | |||
13 | x-ref: | ||
14 | https://github.com/lighttpd/lighttpd1.4/pull/115 | ||
15 | --- | ||
16 | src/gw_backend.c | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/src/gw_backend.c b/src/gw_backend.c | ||
20 | index df9d8217..5db56287 100644 | ||
21 | --- a/src/gw_backend.c | ||
22 | +++ b/src/gw_backend.c | ||
23 | @@ -2228,7 +2228,7 @@ handler_t gw_handle_subrequest(request_st * const r, void *p_d) { | ||
24 | * and module is flagged to stream request body to backend) */ | ||
25 | return (r->conf.stream_request_body & FDEVENT_STREAM_REQUEST) | ||
26 | ? http_response_reqbody_read_error(r, 411) | ||
27 | - : HANDLER_WAIT_FOR_EVENT; | ||
28 | + : (rc == HANDLER_GO_ON) ? HANDLER_WAIT_FOR_EVENT : rc; | ||
29 | } | ||
30 | |||
31 | if (hctx->wb_reqlen < -1 && r->reqbody_length >= 0) { | ||
diff --git a/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb b/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb index 801162867c..78978105b2 100644 --- a/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb +++ b/meta/recipes-extended/lighttpd/lighttpd_1.4.66.bb | |||
@@ -14,6 +14,7 @@ RRECOMMENDS:${PN} = "lighttpd-module-access \ | |||
14 | lighttpd-module-accesslog" | 14 | lighttpd-module-accesslog" |
15 | 15 | ||
16 | SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \ | 16 | SRC_URI = "http://download.lighttpd.net/lighttpd/releases-1.4.x/lighttpd-${PV}.tar.xz \ |
17 | file://CVE-2022-41556.patch \ | ||
17 | file://index.html.lighttpd \ | 18 | file://index.html.lighttpd \ |
18 | file://lighttpd.conf \ | 19 | file://lighttpd.conf \ |
19 | file://lighttpd \ | 20 | file://lighttpd \ |