diff options
| author | Teoh Jay Shen <jay.shen.teoh@intel.com> | 2022-09-15 10:36:53 +0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-09-28 08:02:10 +0100 |
| commit | b19e6f936f95c38d4c542f2468046835f443fce6 (patch) | |
| tree | e213ec9c495d84d004a4da9c3df6437ee3063ca4 /meta/recipes-devtools | |
| parent | 4766aaa5289813a6807c98ff57f718174230031e (diff) | |
| download | poky-b19e6f936f95c38d4c542f2468046835f443fce6.tar.gz | |
go: fix CVE-2022-27664
Upstream-Status: Backport [https://github.com/golang/go/commit/5bc9106458fc07851ac324a4157132a91b1f3479]
(From OE-Core rev: fecad1b8e0f006c0186941706219d39c6c8ba5eb)
Signed-off-by: Teoh Jay Shen <jay.shen.teoh@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools')
| -rw-r--r-- | meta/recipes-devtools/go/go-1.17.13.inc | 1 | ||||
| -rw-r--r-- | meta/recipes-devtools/go/go-1.18/CVE-2022-27664.patch | 102 |
2 files changed, 103 insertions, 0 deletions
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index 95d0fb7e98..b18de66f42 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc | |||
| @@ -16,6 +16,7 @@ SRC_URI += "\ | |||
| 16 | file://0009-Revert-cmd-go-make-sure-CC-and-CXX-are-absolute.patch \ | 16 | file://0009-Revert-cmd-go-make-sure-CC-and-CXX-are-absolute.patch \ |
| 17 | file://0001-exec.go-do-not-write-linker-flags-into-buildids.patch \ | 17 | file://0001-exec.go-do-not-write-linker-flags-into-buildids.patch \ |
| 18 | file://0001-src-cmd-dist-buildgo.go-do-not-hardcode-host-compile.patch \ | 18 | file://0001-src-cmd-dist-buildgo.go-do-not-hardcode-host-compile.patch \ |
| 19 | file://CVE-2022-27664.patch \ | ||
| 19 | " | 20 | " |
| 20 | SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" | 21 | SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" |
| 21 | 22 | ||
diff --git a/meta/recipes-devtools/go/go-1.18/CVE-2022-27664.patch b/meta/recipes-devtools/go/go-1.18/CVE-2022-27664.patch new file mode 100644 index 0000000000..fba4f054ee --- /dev/null +++ b/meta/recipes-devtools/go/go-1.18/CVE-2022-27664.patch | |||
| @@ -0,0 +1,102 @@ | |||
| 1 | From 5bc9106458fc07851ac324a4157132a91b1f3479 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Damien Neil <dneil@google.com> | ||
| 3 | Date: Mon, 22 Aug 2022 16:21:02 -0700 | ||
| 4 | Subject: [PATCH] [release-branch.go1.18] net/http: update bundled | ||
| 5 | golang.org/x/net/http2 | ||
| 6 | |||
| 7 | Disable cmd/internal/moddeps test, since this update includes PRIVATE | ||
| 8 | track fixes. | ||
| 9 | |||
| 10 | Fixes CVE-2022-27664 | ||
| 11 | Fixes #53977 | ||
| 12 | For #54658. | ||
| 13 | |||
| 14 | Change-Id: I84b0b8f61e49e15ef55ef8d738730107a3cf849b | ||
| 15 | Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1554415 | ||
| 16 | Reviewed-by: Roland Shoemaker <bracewell@google.com> | ||
| 17 | Reviewed-by: Tatiana Bradley <tatianabradley@google.com> | ||
| 18 | Reviewed-on: https://go-review.googlesource.com/c/go/+/428635 | ||
| 19 | Reviewed-by: Tatiana Bradley <tatiana@golang.org> | ||
| 20 | Run-TryBot: Michael Knyszek <mknyszek@google.com> | ||
| 21 | TryBot-Result: Gopher Robot <gobot@golang.org> | ||
| 22 | Reviewed-by: Carlos Amedee <carlos@golang.org> | ||
| 23 | |||
| 24 | Upstream-Status: Backport | ||
| 25 | CVE: CVE-2022-27664 | ||
| 26 | |||
| 27 | Reference to upstream patch: https://github.com/golang/go/commit/5bc9106458fc07851ac324a4157132a91b1f3479 | ||
| 28 | Signed-off-by: Teoh Jay Shen <jay.shen.teoh@intel.com> | ||
| 29 | --- | ||
| 30 | src/cmd/internal/moddeps/moddeps_test.go | 2 ++ | ||
| 31 | src/net/http/h2_bundle.go | 21 +++++++++++++-------- | ||
| 32 | 2 files changed, 15 insertions(+), 8 deletions(-) | ||
| 33 | |||
| 34 | diff --git a/src/cmd/internal/moddeps/moddeps_test.go b/src/cmd/internal/moddeps/moddeps_test.go | ||
| 35 | index 56c3b2585c..3306e29431 100644 | ||
| 36 | --- a/src/cmd/internal/moddeps/moddeps_test.go | ||
| 37 | +++ b/src/cmd/internal/moddeps/moddeps_test.go | ||
| 38 | @@ -34,6 +34,8 @@ import ( | ||
| 39 | // See issues 36852, 41409, and 43687. | ||
| 40 | // (Also see golang.org/issue/27348.) | ||
| 41 | func TestAllDependencies(t *testing.T) { | ||
| 42 | + t.Skip("TODO(#53977): 1.18.5 contains unreleased changes from vendored modules") | ||
| 43 | + | ||
| 44 | goBin := testenv.GoToolPath(t) | ||
| 45 | |||
| 46 | // Ensure that all packages imported within GOROOT | ||
| 47 | diff --git a/src/net/http/h2_bundle.go b/src/net/http/h2_bundle.go | ||
| 48 | index bb82f24585..1e78f6cdb9 100644 | ||
| 49 | --- a/src/net/http/h2_bundle.go | ||
| 50 | +++ b/src/net/http/h2_bundle.go | ||
| 51 | @@ -3384,10 +3384,11 @@ func (s http2SettingID) String() string { | ||
| 52 | // name (key). See httpguts.ValidHeaderName for the base rules. | ||
| 53 | // | ||
| 54 | // Further, http2 says: | ||
| 55 | -// "Just as in HTTP/1.x, header field names are strings of ASCII | ||
| 56 | -// characters that are compared in a case-insensitive | ||
| 57 | -// fashion. However, header field names MUST be converted to | ||
| 58 | -// lowercase prior to their encoding in HTTP/2. " | ||
| 59 | +// | ||
| 60 | +// "Just as in HTTP/1.x, header field names are strings of ASCII | ||
| 61 | +// characters that are compared in a case-insensitive | ||
| 62 | +// fashion. However, header field names MUST be converted to | ||
| 63 | +// lowercase prior to their encoding in HTTP/2. " | ||
| 64 | func http2validWireHeaderFieldName(v string) bool { | ||
| 65 | if len(v) == 0 { | ||
| 66 | return false | ||
| 67 | @@ -3578,8 +3579,8 @@ func (s *http2sorter) SortStrings(ss []string) { | ||
| 68 | // validPseudoPath reports whether v is a valid :path pseudo-header | ||
| 69 | // value. It must be either: | ||
| 70 | // | ||
| 71 | -// *) a non-empty string starting with '/' | ||
| 72 | -// *) the string '*', for OPTIONS requests. | ||
| 73 | +// *) a non-empty string starting with '/' | ||
| 74 | +// *) the string '*', for OPTIONS requests. | ||
| 75 | // | ||
| 76 | // For now this is only used a quick check for deciding when to clean | ||
| 77 | // up Opaque URLs before sending requests from the Transport. | ||
| 78 | @@ -5053,6 +5054,9 @@ func (sc *http2serverConn) startGracefulShutdownInternal() { | ||
| 79 | func (sc *http2serverConn) goAway(code http2ErrCode) { | ||
| 80 | sc.serveG.check() | ||
| 81 | if sc.inGoAway { | ||
| 82 | + if sc.goAwayCode == http2ErrCodeNo { | ||
| 83 | + sc.goAwayCode = code | ||
| 84 | + } | ||
| 85 | return | ||
| 86 | } | ||
| 87 | sc.inGoAway = true | ||
| 88 | @@ -6265,8 +6269,9 @@ func (rws *http2responseWriterState) writeChunk(p []byte) (n int, err error) { | ||
| 89 | // prior to the headers being written. If the set of trailers is fixed | ||
| 90 | // or known before the header is written, the normal Go trailers mechanism | ||
| 91 | // is preferred: | ||
| 92 | -// https://golang.org/pkg/net/http/#ResponseWriter | ||
| 93 | -// https://golang.org/pkg/net/http/#example_ResponseWriter_trailers | ||
| 94 | +// | ||
| 95 | +// https://golang.org/pkg/net/http/#ResponseWriter | ||
| 96 | +// https://golang.org/pkg/net/http/#example_ResponseWriter_trailers | ||
| 97 | const http2TrailerPrefix = "Trailer:" | ||
| 98 | |||
| 99 | // promoteUndeclaredTrailers permits http.Handlers to set trailers | ||
| 100 | -- | ||
| 101 | 2.36.1 | ||
| 102 | |||
