!21 fix CVE-2020-25613
From: @jackie_wu123 Reviewed-by: @wang_yue111,@shinwell_hu Signed-off-by: @shinwell_hu
This commit is contained in:
commit
857cbf0332
35
CVE-2020-25613.patch
Normal file
35
CVE-2020-25613.patch
Normal file
@ -0,0 +1,35 @@
|
|||||||
|
From 8946bb38b4d87549f0d99ed73c62c41933f97cc7 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Yusuke Endoh <mame@ruby-lang.org>
|
||||||
|
Date: Tue, 29 Sep 2020 13:15:58 +0900
|
||||||
|
Subject: [PATCH] Make it more strict to interpret some headers
|
||||||
|
|
||||||
|
Some regexps were too tolerant.
|
||||||
|
---
|
||||||
|
lib/webrick/httprequest.rb | 6 +++---
|
||||||
|
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/lib/webrick/httprequest.rb b/lib/webrick/httprequest.rb
|
||||||
|
index 294bd91..d34eac7 100644
|
||||||
|
--- a/lib/webrick/httprequest.rb
|
||||||
|
+++ b/lib/webrick/httprequest.rb
|
||||||
|
@@ -227,9 +227,9 @@ def parse(socket=nil)
|
||||||
|
raise HTTPStatus::BadRequest, "bad URI `#{@unparsed_uri}'."
|
||||||
|
end
|
||||||
|
|
||||||
|
- if /close/io =~ self["connection"]
|
||||||
|
+ if /\Aclose\z/io =~ self["connection"]
|
||||||
|
@keep_alive = false
|
||||||
|
- elsif /keep-alive/io =~ self["connection"]
|
||||||
|
+ elsif /\Akeep-alive\z/io =~ self["connection"]
|
||||||
|
@keep_alive = true
|
||||||
|
elsif @http_version < "1.1"
|
||||||
|
@keep_alive = false
|
||||||
|
@@ -508,7 +508,7 @@ def read_body(socket, block)
|
||||||
|
return unless socket
|
||||||
|
if tc = self['transfer-encoding']
|
||||||
|
case tc
|
||||||
|
- when /chunked/io then read_chunked(socket, block)
|
||||||
|
+ when /\Achunked\z/io then read_chunked(socket, block)
|
||||||
|
else raise HTTPStatus::NotImplemented, "Transfer-Encoding: #{tc}."
|
||||||
|
end
|
||||||
|
elsif self['content-length'] || @remaining_size
|
||||||
11
ruby.spec
11
ruby.spec
@ -1,6 +1,6 @@
|
|||||||
Name: ruby
|
Name: ruby
|
||||||
Version: 2.5.8
|
Version: 2.5.8
|
||||||
Release: 3
|
Release: 4
|
||||||
Summary: Object-oriented scripting language interpreter
|
Summary: Object-oriented scripting language interpreter
|
||||||
License: (Ruby or BSD) and Public Domain and MIT and CC0 and zlib and UCD
|
License: (Ruby or BSD) and Public Domain and MIT and CC0 and zlib and UCD
|
||||||
URL: https://www.ruby-lang.org/en/
|
URL: https://www.ruby-lang.org/en/
|
||||||
@ -37,6 +37,7 @@ Patch0012: ruby-2.5.1-Avoid-need-of-C++-compiler-to-pass-the-test-suite.patch
|
|||||||
Patch6000: CVE-2019-19204.patch
|
Patch6000: CVE-2019-19204.patch
|
||||||
Patch6001: CVE-2019-19246.patch
|
Patch6001: CVE-2019-19246.patch
|
||||||
Patch6002: CVE-2019-16163.patch
|
Patch6002: CVE-2019-16163.patch
|
||||||
|
Patch6003: CVE-2020-25613.patch
|
||||||
|
|
||||||
Provides: %{name}-libs = %{version}-%{release}
|
Provides: %{name}-libs = %{version}-%{release}
|
||||||
Obsoletes: %{name}-libs < %{version}-%{release}
|
Obsoletes: %{name}-libs < %{version}-%{release}
|
||||||
@ -574,6 +575,14 @@ make runruby TESTRUN_SCRIPT=%{SOURCE13}
|
|||||||
%exclude %{gem_dir}/gems/xmlrpc-0.3.0/.*
|
%exclude %{gem_dir}/gems/xmlrpc-0.3.0/.*
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Nov 5 2020 wutao <wutao61@huawei.com> - 2.5.8-4
|
||||||
|
- fix CVE-2020-25613
|
||||||
|
- WEBrick,a simple HTTP server bundled with Ruby,had not
|
||||||
|
- checked the transfer-encoding header value rigorously.
|
||||||
|
- An attacker may potentially exploit this issue to bypass
|
||||||
|
- a reverse proxy,which may lead to an HTTP Request Smuggling
|
||||||
|
- attack.
|
||||||
|
|
||||||
* Fri Aug 7 2020 shixuantong <shixuantong@huawei.com> - 2.5.8-3
|
* Fri Aug 7 2020 shixuantong <shixuantong@huawei.com> - 2.5.8-3
|
||||||
- Type:bugfix
|
- Type:bugfix
|
||||||
- ID:NA
|
- ID:NA
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user