X-Original-To: alpine-aports@lists.alpinelinux.org Received: from mail-lf0-f68.google.com (mail-lf0-f68.google.com [209.85.215.68]) by lists.alpinelinux.org (Postfix) with ESMTP id 78DC65C5269 for ; Wed, 5 Apr 2017 05:42:09 +0000 (GMT) Received: by mail-lf0-f68.google.com with SMTP id r36so248414lfi.0 for ; Tue, 04 Apr 2017 22:42:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=H+PNXXHcuONoZ0G7KV8HfXPh/yLJpl02Abs7w3ixY2c=; b=m6Fc7EJ4E+SeKkmStKK9WcUfV4jQj08ivswEPsjOCobfRbX/A9OJ0YKzufdwVyCS9i pIRLIgh6dfi6MrW091ogekeLqkaJTcjCHezqvZlwMqZywtEh4gTtVc8oCgKhpRIkACWa ULtzXzB31V7GTc0j6LBI+XmrD+9O9+X0a2zsHZMC9GgXWYuk9qLfXbaHulMKZan9Pzdv /s8Kfk8jK3vNdOD7VbdlXx0s3CN3oIsjwumiChXObU3dMeGAx4ScTxE5PLQ7O5pXWxCm y2w9TfhTAJzObGOypKBMQAnCnPD5fusQu6t5E6sGXX9TjdjSq1dIYStKqdg51TlJhVGY 16hg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=H+PNXXHcuONoZ0G7KV8HfXPh/yLJpl02Abs7w3ixY2c=; b=hKrLAgvgd8kZF5W4Q6x9i3fCiSlWqlJw7vVBhBCEcPj661iBd+hIhNW0gnG+jptNDT lidPekqf2JFKAF1WicGR7lZUYO1AxqW+M13+hXAMTArJW8fYaerVBzQREC+bhD+/T+jX YG0da47gPxTJf6LwGsZDQ9o/i3TvUaIehYqAg1CPXZAPOm+O3ipqWAy9qKl2bsCwiRTP 8XfbdKSq4CtCOWcdNGRba87MuSWpdlpVNREdDNVxhdtk8vkde8koNyWI39AbNKwEfNap rwsj+r1Ed0z9uK0PAeC74rteA/6KdsG0Ls2KLzR8RMkPplf43es/Fr5e7drPQ3gIztQh cpOA== X-Gm-Message-State: AFeK/H31BbCbjnNmT4ftXgeWrS9tCYI06wUHuoxGBjygS9WSWW7N5xurYd9pC5QzdgZfeA== X-Received: by 10.25.92.212 with SMTP id u81mr7389103lfi.160.1491370928761; Tue, 04 Apr 2017 22:42:08 -0700 (PDT) Received: from v3-5.util.wtbts.net ([83.145.235.199]) by smtp.gmail.com with ESMTPSA id f187sm3473678lfg.37.2017.04.04.22.42.07 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 04 Apr 2017 22:42:08 -0700 (PDT) From: Sergei Lukin To: alpine-aports@lists.alpinelinux.org Cc: Sergei Lukin Subject: [alpine-aports] [PATCH v3.5] main/wget: security fixes #7088 Date: Wed, 5 Apr 2017 05:42:01 +0000 Message-Id: <20170405054201.12835-1-sergej.lukin@gmail.com> X-Mailer: git-send-email 2.11.1 X-Mailinglist: alpine-aports Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: CVE-2017-6508: CRLF injection in the url_parse function in url.c --- main/wget/APKBUILD | 20 +++++++++++++++----- main/wget/CVE-2017-6508.patch | 25 +++++++++++++++++++++++++ 2 files changed, 40 insertions(+), 5 deletions(-) create mode 100644 main/wget/CVE-2017-6508.patch diff --git a/main/wget/APKBUILD b/main/wget/APKBUILD index 1bbd5a9d2d..ecf8c5c1d1 100644 --- a/main/wget/APKBUILD +++ b/main/wget/APKBUILD @@ -1,8 +1,9 @@ +# Contributor: Sergei Lukin # Contributor: Carlo Landmeter # Maintainer: Carlo Landmeter pkgname=wget pkgver=1.18 -pkgrel=1 +pkgrel=2 pkgdesc="A network utility to retrieve files from the Web" url="http://www.gnu.org/software/wget/wget.html" arch="all" @@ -11,7 +12,13 @@ depends="" makedepends="libressl-dev perl" subpackages="$pkgname-doc" install="" -source="ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz" +source="ftp://ftp.gnu.org/gnu/$pkgname/$pkgname-$pkgver.tar.gz + CVE-2017-6508.patch + " + +# secfixes: +# 1.19.1-r1: +# - CVE-2017-6508 _builddir="$srcdir"/$pkgname-$pkgver prepare() { @@ -47,6 +54,9 @@ package() { return 0 } -md5sums="fc2debd8399e3b933a9b226794e2a886 wget-1.18.tar.gz" -sha256sums="a00a65fab84cc46e24c53ce88c45604668a7a479276e037dc2f558e34717fb2d wget-1.18.tar.gz" -sha512sums="a6c31ea7161e5af1552713edc6d9e386e4d63e53660bedbc4b099c7a4c7bbbdfedb4fc8abea67158899dee82b6331c87b1f2a9cb14cbcbcfa6e19a7fdf26b0a1 wget-1.18.tar.gz" +md5sums="fc2debd8399e3b933a9b226794e2a886 wget-1.18.tar.gz +85943debf4c1633acb0b011429783e5d CVE-2017-6508.patch" +sha256sums="a00a65fab84cc46e24c53ce88c45604668a7a479276e037dc2f558e34717fb2d wget-1.18.tar.gz +a594d3d1743b5a53f5c77bce8c21752776402bf7b65fd178aeee9d61afd07f3e CVE-2017-6508.patch" +sha512sums="a6c31ea7161e5af1552713edc6d9e386e4d63e53660bedbc4b099c7a4c7bbbdfedb4fc8abea67158899dee82b6331c87b1f2a9cb14cbcbcfa6e19a7fdf26b0a1 wget-1.18.tar.gz +666b94bcba6a257be01f0d18897c13afe7dcc4eb156e7d6b386de06fdcbdd0da31a2cc7a8ffaa5108dff67872f610b9df30d0df9e8132283255ec6c608fff904 CVE-2017-6508.patch" diff --git a/main/wget/CVE-2017-6508.patch b/main/wget/CVE-2017-6508.patch new file mode 100644 index 0000000000..b685d8dab4 --- /dev/null +++ b/main/wget/CVE-2017-6508.patch @@ -0,0 +1,25 @@ +Patch source: +http://git.savannah.gnu.org/cgit/wget.git/diff/?id=4d729e322fae359a1aefaafec1144764a54e8ad4 + +diff --git a/src/url.c b/src/url.c +index 8f8ff0b..7d36b27 100644 +--- a/src/url.c ++++ b/src/url.c +@@ -925,6 +925,17 @@ url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) + url_unescape (u->host); + host_modified = true; + ++ /* check for invalid control characters in host name */ ++ for (p = u->host; *p; p++) ++ { ++ if (c_iscntrl(*p)) ++ { ++ url_free(u); ++ error_code = PE_INVALID_HOST_NAME; ++ goto error; ++ } ++ } ++ + /* Apply IDNA regardless of iri->utf8_encode status */ + if (opt.enable_iri && iri) + { -- 2.11.1 --- Unsubscribe: alpine-aports+unsubscribe@lists.alpinelinux.org Help: alpine-aports+help@lists.alpinelinux.org ---