From 5f7bada988963e43493b4b5dcc89d18cbf726f1e Mon Sep 17 00:00:00 2001 From: Johnny Hughes Date: Jun 24 2019 18:59:59 +0000 Subject: Apply armhfp patch to commit 2 --- diff --git a/.gitignore b/.gitignore index 57ce097..623b82d 100644 --- a/.gitignore +++ b/.gitignore @@ -1 +1 @@ -SOURCES/go1.11-openssl-1.1-fips.tar.gz +SOURCES/go-go1.11.5-openssl-1.1.tar.gz diff --git a/.golang.metadata b/.golang.metadata index 8718385..8bde8f8 100644 --- a/.golang.metadata +++ b/.golang.metadata @@ -1 +1 @@ -3bead9d9ca5a21395ff2cd7fea3ed2c4dca070cb SOURCES/go1.11-openssl-1.1-fips.tar.gz +9aba703a55e4c2a171866fb9658962342d1feeda SOURCES/go-go1.11.5-openssl-1.1.tar.gz diff --git a/SOURCES/reject-control-chars.patch b/SOURCES/reject-control-chars.patch new file mode 100644 index 0000000..0033ad2 --- /dev/null +++ b/SOURCES/reject-control-chars.patch @@ -0,0 +1,185 @@ +From eb0f2b3d27a896e4b832f2450490a2bbf72fbb6c Mon Sep 17 00:00:00 2001 +From: Brad Fitzpatrick +Date: Thu, 31 Jan 2019 20:17:12 +0000 +Subject: [PATCH] [release-branch.go1.11] net/http, net/url: reject control + characters in URLs + +Cherry pick of combined CL 159157 + CL 160178. + +Fixes #29923 +Updates #27302 +Updates #22907 + +Change-Id: I6de92c14284595a58321a4b4d53229285979b872 +Reviewed-on: https://go-review.googlesource.com/c/160798 +Run-TryBot: Brad Fitzpatrick +TryBot-Result: Gobot Gobot +Reviewed-by: Ian Lance Taylor +--- + src/net/http/fs_test.go | 15 +++++++++++---- + src/net/http/http.go | 11 +++++++++++ + src/net/http/request.go | 7 ++++++- + src/net/http/requestwrite_test.go | 11 +++++++++++ + src/net/url/url.go | 15 +++++++++++++++ + src/net/url/url_test.go | 23 ++++++++++++++++++++++- + 6 files changed, 76 insertions(+), 6 deletions(-) + +diff --git a/src/net/http/fs_test.go b/src/net/http/fs_test.go +index 255d215f3cf..762e88b05ff 100644 +--- a/src/net/http/fs_test.go ++++ b/src/net/http/fs_test.go +@@ -583,16 +583,23 @@ func TestFileServerZeroByte(t *testing.T) { + ts := httptest.NewServer(FileServer(Dir("."))) + defer ts.Close() + +- res, err := Get(ts.URL + "/..\x00") ++ c, err := net.Dial("tcp", ts.Listener.Addr().String()) + if err != nil { + t.Fatal(err) + } +- b, err := ioutil.ReadAll(res.Body) ++ defer c.Close() ++ _, err = fmt.Fprintf(c, "GET /..\x00 HTTP/1.0\r\n\r\n") ++ if err != nil { ++ t.Fatal(err) ++ } ++ var got bytes.Buffer ++ bufr := bufio.NewReader(io.TeeReader(c, &got)) ++ res, err := ReadResponse(bufr, nil) + if err != nil { +- t.Fatal("reading Body:", err) ++ t.Fatal("ReadResponse: ", err) + } + if res.StatusCode == 200 { +- t.Errorf("got status 200; want an error. Body is:\n%s", string(b)) ++ t.Errorf("got status 200; want an error. Body is:\n%s", got.Bytes()) + } + } + +diff --git a/src/net/http/http.go b/src/net/http/http.go +index ce0eceb1de3..07ca78dbc84 100644 +--- a/src/net/http/http.go ++++ b/src/net/http/http.go +@@ -59,6 +59,17 @@ func isASCII(s string) bool { + return true + } + ++// stringContainsCTLByte reports whether s contains any ASCII control character. ++func stringContainsCTLByte(s string) bool { ++ for i := 0; i < len(s); i++ { ++ b := s[i] ++ if b < ' ' || b == 0x7f { ++ return true ++ } ++ } ++ return false ++} ++ + func hexEscapeNonASCII(s string) string { + newLen := 0 + for i := 0; i < len(s); i++ { +diff --git a/src/net/http/request.go b/src/net/http/request.go +index a40b0a3cb83..e352386b083 100644 +--- a/src/net/http/request.go ++++ b/src/net/http/request.go +@@ -545,7 +545,12 @@ func (r *Request) write(w io.Writer, usingProxy bool, extraHeaders Header, waitF + // CONNECT requests normally give just the host and port, not a full URL. + ruri = host + } +- // TODO(bradfitz): escape at least newlines in ruri? ++ if stringContainsCTLByte(ruri) { ++ return errors.New("net/http: can't write control character in Request.URL") ++ } ++ // TODO: validate r.Method too? At least it's less likely to ++ // come from an attacker (more likely to be a constant in ++ // code). + + // Wrap the writer in a bufio Writer if it's not already buffered. + // Don't always call NewWriter, as that forces a bytes.Buffer +diff --git a/src/net/http/requestwrite_test.go b/src/net/http/requestwrite_test.go +index eb65b9f736f..3daab4b8b7b 100644 +--- a/src/net/http/requestwrite_test.go ++++ b/src/net/http/requestwrite_test.go +@@ -512,6 +512,17 @@ var reqWriteTests = []reqWriteTest{ + "User-Agent: Go-http-client/1.1\r\n" + + "\r\n", + }, ++ ++ 21: { ++ Req: Request{ ++ Method: "GET", ++ URL: &url.URL{ ++ Host: "www.example.com", ++ RawQuery: "new\nline", // or any CTL ++ }, ++ }, ++ WantError: errors.New("net/http: can't write control character in Request.URL"), ++ }, + } + + func TestRequestWrite(t *testing.T) { +diff --git a/src/net/url/url.go b/src/net/url/url.go +index 80eb7a86c8d..8d2a8566998 100644 +--- a/src/net/url/url.go ++++ b/src/net/url/url.go +@@ -494,6 +494,10 @@ func parse(rawurl string, viaRequest bool) (*URL, error) { + var rest string + var err error + ++ if stringContainsCTLByte(rawurl) { ++ return nil, errors.New("net/url: invalid control character in URL") ++ } ++ + if rawurl == "" && viaRequest { + return nil, errors.New("empty url") + } +@@ -1114,3 +1118,14 @@ func validUserinfo(s string) bool { + } + return true + } ++ ++// stringContainsCTLByte reports whether s contains any ASCII control character. ++func stringContainsCTLByte(s string) bool { ++ for i := 0; i < len(s); i++ { ++ b := s[i] ++ if b < ' ' || b == 0x7f { ++ return true ++ } ++ } ++ return false ++} +diff --git a/src/net/url/url_test.go b/src/net/url/url_test.go +index 9043a844e88..369ea6cbd25 100644 +--- a/src/net/url/url_test.go ++++ b/src/net/url/url_test.go +@@ -1738,8 +1738,29 @@ func TestNilUser(t *testing.T) { + } + + func TestInvalidUserPassword(t *testing.T) { +- _, err := Parse("http://us\ner:pass\nword@foo.com/") ++ _, err := Parse("http://user^:passwo^rd@foo.com/") + if got, wantsub := fmt.Sprint(err), "net/url: invalid userinfo"; !strings.Contains(got, wantsub) { + t.Errorf("error = %q; want substring %q", got, wantsub) + } + } ++ ++func TestRejectControlCharacters(t *testing.T) { ++ tests := []string{ ++ "http://foo.com/?foo\nbar", ++ "http\r://foo.com/", ++ "http://foo\x7f.com/", ++ } ++ for _, s := range tests { ++ _, err := Parse(s) ++ const wantSub = "net/url: invalid control character in URL" ++ if got := fmt.Sprint(err); !strings.Contains(got, wantSub) { ++ t.Errorf("Parse(%q) error = %q; want substring %q", s, got, wantSub) ++ } ++ } ++ ++ // But don't reject non-ASCII CTLs, at least for now: ++ if _, err := Parse("http://foo.com/ctl\x80"); err != nil { ++ t.Errorf("error parsing URL with non-ASCII control byte: %v", err) ++ } ++ ++} diff --git a/SPECS/golang.spec b/SPECS/golang.spec index 22bc63e..324fe02 100644 --- a/SPECS/golang.spec +++ b/SPECS/golang.spec @@ -101,12 +101,12 @@ Name: golang Version: 1.11.5 -Release: 1%{?dist} +Release: 2%{?dist} Summary: The Go Programming Language # source tree includes several copies of Mark.Twain-Tom.Sawyer.txt under Public Domain License: BSD and Public Domain URL: http://golang.org/ -Source0: https://github.com/derekparker/go/archive/go1.11-openssl-1.1-fips.tar.gz +Source0: https://pagure.io/go/archive/go1.11.5-openssl-1.1/go-go1.11.5-openssl-1.1.tar.gz # make possible to override default traceback level at build time by setting build tag rpm_crashtraceback Source1: fedora.go Source2: golang.macros @@ -139,6 +139,7 @@ Patch215: ./go1.5-zoneinfo_testing_only.patch # Proposed patch by jcajka https://golang.org/cl/86541 Patch221: fix_TestScript_list_std.patch +Patch222: reject-control-chars.patch # Having documentation separate was broken @@ -228,12 +229,13 @@ Requires: %{name} = %{version}-%{release} %endif %prep -%setup -q -n go-go1.11-openssl-1.1-fips +%setup -q -n go-go1.11.5-openssl-1.1 %patch215 -p1 %patch221 -p1 +%patch222 -p1 cp %{SOURCE1} ./src/runtime/ @@ -496,6 +498,13 @@ cd .. %endif %changelog +* Thu Apr 4 2019 Derek Parker - 1.11.5-2 +- Include patch to fix CVE-2019-9741 +- Resolves: rhbz#1690443 + +* Mon Feb 18 2019 Derek Parker - 1.11.5-2 +- Switch to pagure fork for Go FIPS + * Thu Feb 7 2019 Derek Parker - 1.11.5-1 - Rebase to Go 1.11.5 - Resolves: rhbz#1671277