summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChangqing Li <changqing.li@windriver.com>2025-06-03 13:20:55 +0800
committerSteve Sakoman <steve@sakoman.com>2025-06-13 09:01:26 -0700
commite8d14bbbc11e32cc7641e47ead536d62421646b0 (patch)
treecc967a703ca2ff2b3023aa30f3099d31e0bdab59
parent2526655f7613098af2409367004785f5ab89fd83 (diff)
downloadpoky-e8d14bbbc11e32cc7641e47ead536d62421646b0.tar.gz
libsoup: fix CVE-2025-4476
Refer: https://gitlab.gnome.org/GNOME/libsoup/-/issues/440 (From OE-Core rev: 0b93d8cedfd102fcd723786b975a5cf684c2b0e8) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-support/libsoup/libsoup/CVE-2025-4476.patch39
-rw-r--r--meta/recipes-support/libsoup/libsoup_3.6.5.bb3
2 files changed, 41 insertions, 1 deletions
diff --git a/meta/recipes-support/libsoup/libsoup/CVE-2025-4476.patch b/meta/recipes-support/libsoup/libsoup/CVE-2025-4476.patch
new file mode 100644
index 0000000000..d0b1f12709
--- /dev/null
+++ b/meta/recipes-support/libsoup/libsoup/CVE-2025-4476.patch
@@ -0,0 +1,39 @@
1From 71d33e37139fee6216ad2bf4e926f987076a6cff Mon Sep 17 00:00:00 2001
2From: Michael Catanzaro <mcatanzaro@redhat.com>
3Date: Thu, 8 May 2025 09:27:01 -0500
4Subject: [PATCH] auth-digest: fix crash in
5 soup_auth_digest_get_protection_space()
6
7We need to validate the Domain parameter in the WWW-Authenticate header.
8
9Unfortunately this crash only occurs when listening on default ports 80
10and 443, so there's no good way to test for this. The test would require
11running as root.
12
13Fixes #440
14
15CVE: CVE-2025-4476
16Upstream-Status: Backport
17[https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/457/diffs?commit_id=e64c221f9c7d09b48b610c5626b3b8c400f0907c]
18
19Signed-off-by: Changqing Li <changqing.li@windriver.c
20---
21 libsoup/auth/soup-auth-digest.c | 2 +-
22 1 file changed, 1 insertion(+), 1 deletion(-)
23
24diff --git a/libsoup/auth/soup-auth-digest.c b/libsoup/auth/soup-auth-digest.c
25index d8bb291..292f204 100644
26--- a/libsoup/auth/soup-auth-digest.c
27+++ b/libsoup/auth/soup-auth-digest.c
28@@ -220,7 +220,7 @@ soup_auth_digest_get_protection_space (SoupAuth *auth, GUri *source_uri)
29 if (uri &&
30 g_strcmp0 (g_uri_get_scheme (uri), g_uri_get_scheme (source_uri)) == 0 &&
31 g_uri_get_port (uri) == g_uri_get_port (source_uri) &&
32- !strcmp (g_uri_get_host (uri), g_uri_get_host (source_uri)))
33+ !g_strcmp0 (g_uri_get_host (uri), g_uri_get_host (source_uri)))
34 dir = g_strdup (g_uri_get_path (uri));
35 else
36 dir = NULL;
37--
382.34.1
39
diff --git a/meta/recipes-support/libsoup/libsoup_3.6.5.bb b/meta/recipes-support/libsoup/libsoup_3.6.5.bb
index 2faf50c223..2bed009e0a 100644
--- a/meta/recipes-support/libsoup/libsoup_3.6.5.bb
+++ b/meta/recipes-support/libsoup/libsoup_3.6.5.bb
@@ -12,7 +12,8 @@ DEPENDS = "glib-2.0 glib-2.0-native libxml2 sqlite3 libpsl nghttp2"
12SHRT_VER = "${@d.getVar('PV').split('.')[0]}.${@d.getVar('PV').split('.')[1]}" 12SHRT_VER = "${@d.getVar('PV').split('.')[0]}.${@d.getVar('PV').split('.')[1]}"
13 13
14SRC_URI = "${GNOME_MIRROR}/libsoup/${SHRT_VER}/libsoup-${PV}.tar.xz \ 14SRC_URI = "${GNOME_MIRROR}/libsoup/${SHRT_VER}/libsoup-${PV}.tar.xz \
15 file://CVE-2025-32914.patch" 15 file://CVE-2025-32914.patch \
16 file://CVE-2025-4476.patch"
16SRC_URI[sha256sum] = "6891765aac3e949017945c3eaebd8cc8216df772456dc9f460976fbdb7ada234" 17SRC_URI[sha256sum] = "6891765aac3e949017945c3eaebd8cc8216df772456dc9f460976fbdb7ada234"
17 18
18PROVIDES = "libsoup-3.0" 19PROVIDES = "libsoup-3.0"