From patchwork Wed Sep 20 22:30:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve Sakoman X-Patchwork-Id: 30846 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9A3C4C2FC0C for ; Wed, 20 Sep 2023 22:31:13 +0000 (UTC) Received: from mail-ot1-f41.google.com (mail-ot1-f41.google.com [209.85.210.41]) by mx.groups.io with SMTP id smtpd.web10.3130.1695249066000368007 for ; Wed, 20 Sep 2023 15:31:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@sakoman-com.20230601.gappssmtp.com header.s=20230601 header.b=Skoo/8zA; spf=softfail (domain: sakoman.com, ip: 209.85.210.41, mailfrom: steve@sakoman.com) Received: by mail-ot1-f41.google.com with SMTP id 46e09a7af769-6beff322a97so239936a34.3 for ; Wed, 20 Sep 2023 15:31:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sakoman-com.20230601.gappssmtp.com; s=20230601; t=1695249065; x=1695853865; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=R89OIhdHvFnFHCEfL1z68kdY+p4eiDIqNNr2iPBtYJ8=; b=Skoo/8zANAvNWdMdAz3ZFcyvU+DCT3plf55KWQDZrZSTBC1mkG+3RXTpgBKNo/YcXE eI3PykwSoEBhmxA0eHi0BJDZ4GwaTAxvlIrPfRf0aodSVROyU7kOnaEur7gD/fqYf0+k msxc939PQi1YMkqrgeMMDsZYotaz3db6vG3wfvkp/84924UBzCakW1X0BFRZ4RY8Engq zs0jha3E2w2RF5VM57MVLSEu3GfyIzNJsmNeVvM0yET1G3H3kYmXDK1g8UA8nMYEFpiC MNyjhqq2k+ERHUDvjOjesS14tyQXxtJZJW+3QzpyxzDK5KkLSjtgTfn0uTXGVV2imXr9 wWyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695249065; x=1695853865; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=R89OIhdHvFnFHCEfL1z68kdY+p4eiDIqNNr2iPBtYJ8=; b=B0cUZgjM8pzCdK4M5Qt7H6SN/lc44sHQGFJuevdLZZBDMj6sd/24WRMgapWJyHec77 +PiGP9HzajfOKMWhpmwWjmw7dnnk7hq1Y6j3y+rJQr1aL+ecIg9bkOIA66fXMJ718t9U 518DOlUlYv6Gw4trQswK0SCtzLXi3jJXzSX7h/tcT47B/vBnjyOC/Z90KP1jtmn6Pqr9 rEmr54lOzA7BpaqPTv/8VRiL+dKEnxJm3lNAWmYVnxdYayI13mBZfZQOlobK5sEGZpxW guSBjQnaBvjtxCNsteYF+gfJXK25QMbt1yGbJkbk+Dsu6ZX7SWRU2dSRbZTVlG2equyk swvg== X-Gm-Message-State: AOJu0Yyhe8Oq7rRvxuFO0/vILAoyE6AvBCK/4qUIdGb3Ix+jzOKvGJfi 6ObuHnbBNejYSy0QxaZ9XOhtKuKeB1eul67Q1mc= X-Google-Smtp-Source: AGHT+IHYlvt95fsv5+DOxjefwHv8/R7UHSJIqS7Xl3Ka3W4cM/NG4E2rDptD7BebkeJ+vfRHK/GS8w== X-Received: by 2002:a05:6358:428f:b0:142:d62c:78e5 with SMTP id s15-20020a056358428f00b00142d62c78e5mr4401143rwc.15.1695249064626; Wed, 20 Sep 2023 15:31:04 -0700 (PDT) Received: from hexa.lan (dhcp-72-234-106-30.hawaiiantel.net. [72.234.106.30]) by smtp.gmail.com with ESMTPSA id a13-20020a63704d000000b00578f1a71a91sm11535pgn.79.2023.09.20.15.31.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Sep 2023 15:31:04 -0700 (PDT) From: Steve Sakoman To: openembedded-core@lists.openembedded.org Subject: [OE-core][kirkstone 01/20] go: Fix CVE-2023-39319 Date: Wed, 20 Sep 2023 12:30:38 -1000 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 20 Sep 2023 22:31:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/187949 From: Soumya Sambu The html/template package does not apply the proper rules for handling occurrences of " contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack. References: https://nvd.nist.gov/vuln/detail/CVE-2023-39319 Signed-off-by: Soumya Sambu Signed-off-by: Steve Sakoman --- meta/recipes-devtools/go/go-1.17.13.inc | 3 +- .../go/go-1.20/CVE-2023-39319.patch | 254 ++++++++++++++++++ 2 files changed, 256 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-devtools/go/go-1.20/CVE-2023-39319.patch diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc index 91dd886cd0..c753a26a7e 100644 --- a/meta/recipes-devtools/go/go-1.17.13.inc +++ b/meta/recipes-devtools/go/go-1.17.13.inc @@ -1,6 +1,6 @@ require go-common.inc -FILESEXTRAPATHS:prepend := "${FILE_DIRNAME}/go-1.21:${FILE_DIRNAME}/go-1.19:${FILE_DIRNAME}/go-1.18:" +FILESEXTRAPATHS:prepend := "${FILE_DIRNAME}/go-1.21:${FILE_DIRNAME}/go-1.20:${FILE_DIRNAME}/go-1.19:${FILE_DIRNAME}/go-1.18:" LIC_FILES_CHKSUM = "file://LICENSE;md5=5d4950ecb7b26d2c5e4e7b4e0dd74707" @@ -43,6 +43,7 @@ SRC_URI += "\ file://CVE-2023-24531_1.patch \ file://CVE-2023-24531_2.patch \ file://CVE-2023-29409.patch \ + file://CVE-2023-39319.patch \ " SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784ada0cd300fd" diff --git a/meta/recipes-devtools/go/go-1.20/CVE-2023-39319.patch b/meta/recipes-devtools/go/go-1.20/CVE-2023-39319.patch new file mode 100644 index 0000000000..1554aa975c --- /dev/null +++ b/meta/recipes-devtools/go/go-1.20/CVE-2023-39319.patch @@ -0,0 +1,254 @@ +From 2070531d2f53df88e312edace6c8dfc9686ab2f5 Mon Sep 17 00:00:00 2001 +From: Roland Shoemaker +Date: Thu Aug 3 12:28:28 2023 -0700 +Subject: [PATCH] html/template: properly handle special tags within the script + context + +The HTML specification has incredibly complex rules for how to handle +"