diff options
author | Robert Joslyn <robert.joslyn@redrectangle.org> | 2022-09-05 12:07:43 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-09-12 08:41:51 +0100 |
commit | 8f4bbd9359109b5d05fca1b424f45de61b4376ae (patch) | |
tree | 3422ae5bcffd4ce9994979e1bfa75027f4a0c420 /meta | |
parent | d24759196aa51525e21f3edfe867930c8e323fa7 (diff) | |
download | poky-8f4bbd9359109b5d05fca1b424f45de61b4376ae.tar.gz |
curl: Backport patch for CVE-2022-35252
https://curl.se/docs/CVE-2022-35252.html
(From OE-Core rev: 59344420eb62060c79265a2557d2364c8174e46c)
Signed-off-by: Robert Joslyn <robert.joslyn@redrectangle.org>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-support/curl/curl/CVE-2022-35252.patch | 72 | ||||
-rw-r--r-- | meta/recipes-support/curl/curl_7.69.1.bb | 1 |
2 files changed, 73 insertions, 0 deletions
diff --git a/meta/recipes-support/curl/curl/CVE-2022-35252.patch b/meta/recipes-support/curl/curl/CVE-2022-35252.patch new file mode 100644 index 0000000000..a5160c01f4 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2022-35252.patch | |||
@@ -0,0 +1,72 @@ | |||
1 | From c9212bdb21f0cc90a1a60dfdbb716deefe78fd40 Mon Sep 17 00:00:00 2001 | ||
2 | From: Daniel Stenberg <daniel@haxx.se> | ||
3 | Date: Mon, 29 Aug 2022 00:09:17 +0200 | ||
4 | Subject: [PATCH] cookie: reject cookies with "control bytes" | ||
5 | |||
6 | Rejects 0x01 - 0x1f (except 0x09) plus 0x7f | ||
7 | |||
8 | Reported-by: Axel Chong | ||
9 | |||
10 | Bug: https://curl.se/docs/CVE-2022-35252.html | ||
11 | |||
12 | CVE-2022-35252 | ||
13 | |||
14 | Closes #9381 | ||
15 | |||
16 | Upstream-Status: Backport [https://github.com/curl/curl/commit/8dfc93e573ca740544a2d79ebb] | ||
17 | |||
18 | Signed-off-by: Robert Joslyn <robert.joslyn@redrectangle.org> | ||
19 | --- | ||
20 | lib/cookie.c | 29 +++++++++++++++++++++++++++++ | ||
21 | 1 file changed, 29 insertions(+) | ||
22 | |||
23 | diff --git a/lib/cookie.c b/lib/cookie.c | ||
24 | index a9ad20a..66c7715 100644 | ||
25 | --- a/lib/cookie.c | ||
26 | +++ b/lib/cookie.c | ||
27 | @@ -412,6 +412,30 @@ static bool bad_domain(const char *domain) | ||
28 | return !strchr(domain, '.') && !strcasecompare(domain, "localhost"); | ||
29 | } | ||
30 | |||
31 | +/* | ||
32 | + RFC 6265 section 4.1.1 says a server should accept this range: | ||
33 | + | ||
34 | + cookie-octet = %x21 / %x23-2B / %x2D-3A / %x3C-5B / %x5D-7E | ||
35 | + | ||
36 | + But Firefox and Chrome as of June 2022 accept space, comma and double-quotes | ||
37 | + fine. The prime reason for filtering out control bytes is that some HTTP | ||
38 | + servers return 400 for requests that contain such. | ||
39 | +*/ | ||
40 | +static int invalid_octets(const char *p) | ||
41 | +{ | ||
42 | + /* Reject all bytes \x01 - \x1f (*except* \x09, TAB) + \x7f */ | ||
43 | + static const char badoctets[] = { | ||
44 | + "\x01\x02\x03\x04\x05\x06\x07\x08\x0a" | ||
45 | + "\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14" | ||
46 | + "\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x7f" | ||
47 | + }; | ||
48 | + size_t vlen, len; | ||
49 | + /* scan for all the octets that are *not* in cookie-octet */ | ||
50 | + len = strcspn(p, badoctets); | ||
51 | + vlen = strlen(p); | ||
52 | + return (len != vlen); | ||
53 | +} | ||
54 | + | ||
55 | /**************************************************************************** | ||
56 | * | ||
57 | * Curl_cookie_add() | ||
58 | @@ -558,6 +582,11 @@ Curl_cookie_add(struct Curl_easy *data, | ||
59 | badcookie = TRUE; | ||
60 | break; | ||
61 | } | ||
62 | + if(invalid_octets(whatptr) || invalid_octets(name)) { | ||
63 | + infof(data, "invalid octets in name/value, cookie dropped"); | ||
64 | + badcookie = TRUE; | ||
65 | + break; | ||
66 | + } | ||
67 | } | ||
68 | else if(!len) { | ||
69 | /* this was a "<name>=" with no content, and we must allow | ||
70 | -- | ||
71 | 2.35.1 | ||
72 | |||
diff --git a/meta/recipes-support/curl/curl_7.69.1.bb b/meta/recipes-support/curl/curl_7.69.1.bb index 7b67b68f1d..ed37094049 100644 --- a/meta/recipes-support/curl/curl_7.69.1.bb +++ b/meta/recipes-support/curl/curl_7.69.1.bb | |||
@@ -38,6 +38,7 @@ SRC_URI = "https://curl.haxx.se/download/curl-${PV}.tar.bz2 \ | |||
38 | file://CVE-2022-32206.patch \ | 38 | file://CVE-2022-32206.patch \ |
39 | file://CVE-2022-32207.patch \ | 39 | file://CVE-2022-32207.patch \ |
40 | file://CVE-2022-32208.patch \ | 40 | file://CVE-2022-32208.patch \ |
41 | file://CVE-2022-35252.patch \ | ||
41 | " | 42 | " |
42 | 43 | ||
43 | SRC_URI[md5sum] = "ec5fc263f898a3dfef08e805f1ecca42" | 44 | SRC_URI[md5sum] = "ec5fc263f898a3dfef08e805f1ecca42" |