diff options
author | Sven Neumann <s.neumann@raumfeld.com> | 2012-02-27 13:38:57 +0100 |
---|---|---|
committer | Peter Korsgaard <jacmet@sunsite.dk> | 2012-02-28 09:22:21 +0100 |
commit | 8d485749e136ed43b5f1129dee08b7e4200182fa (patch) | |
tree | 69598cdc7b596e478b7ddef3b0127fe7162bb290 /package/libsoup/libsoup-CVE-2011-2054.patch | |
parent | 01ffa2e8684d2a3114469cc423e6ee992fd71599 (diff) | |
download | buildroot-novena-8d485749e136ed43b5f1129dee08b7e4200182fa.tar.gz buildroot-novena-8d485749e136ed43b5f1129dee08b7e4200182fa.zip |
libsoup: update to version 2.36.1
Update to latest stable release. SSL support now depends on
glib-networking with gnutls support instead of using gnutls
directly.
Remove libsoup-CVE-2011-2054.patch, this is fixed upstream.
Signed-off-by: Sven Neumann <s.neumann@raumfeld.com>
Signed-off-by: Peter Korsgaard <jacmet@sunsite.dk>
Diffstat (limited to 'package/libsoup/libsoup-CVE-2011-2054.patch')
-rw-r--r-- | package/libsoup/libsoup-CVE-2011-2054.patch | 32 |
1 files changed, 0 insertions, 32 deletions
diff --git a/package/libsoup/libsoup-CVE-2011-2054.patch b/package/libsoup/libsoup-CVE-2011-2054.patch deleted file mode 100644 index 0dc5eccf9..000000000 --- a/package/libsoup/libsoup-CVE-2011-2054.patch +++ /dev/null @@ -1,32 +0,0 @@ -From 4617b6ef6dd21931a0153070c5b5ff7ef21b46f8 Mon Sep 17 00:00:00 2001 -From: Dan Winship <danw@gnome.org> -Date: Wed, 29 Jun 2011 10:04:06 -0400 -Subject: [PATCH] SoupServer: fix to not allow smuggling ".." into path - -When SoupServer:raw-paths was set (the default), it was possible to -sneak ".." segments into the path passed to the SoupServerHandler, -which could then end up tricking some handlers into retrieving -arbitrary files from the filesystem. Fix that. - -https://bugzilla.gnome.org/show_bug.cgi?id=653258 - -diff --git a/libsoup/soup-server.c b/libsoup/soup-server.c -index d56efd1..7225337 100644 ---- a/libsoup/soup-server.c -+++ b/libsoup/soup-server.c -@@ -779,6 +779,15 @@ got_headers (SoupMessage *req, SoupClientContext *client) - - uri = soup_message_get_uri (req); - decoded_path = soup_uri_decode (uri->path); -+ -+ if (strstr (decoded_path, "/../") || -+ g_str_has_suffix (decoded_path, "/..")) { -+ /* Introducing new ".." segments is not allowed */ -+ g_free (decoded_path); -+ soup_message_set_status (req, SOUP_STATUS_BAD_REQUEST); -+ return; -+ } -+ - soup_uri_set_path (uri, decoded_path); - g_free (decoded_path); - } |