From 1683ac4f78f00210bcdcc69e9c2f409a7bae062b Mon Sep 17 00:00:00 2001 From: Lukas Tinkl Date: Tue, 4 Oct 2011 17:41:35 +0200 Subject: [PATCH] Resolves #743056 - CVE-2011-3365 kdelibs: input validation failure in KSSL --- kdelibs-4.7.1-CVE-2011-3365.patch | 84 +++++++++++++++++++++++++++++++ kdelibs.spec | 11 +++- 2 files changed, 93 insertions(+), 2 deletions(-) create mode 100644 kdelibs-4.7.1-CVE-2011-3365.patch diff --git a/kdelibs-4.7.1-CVE-2011-3365.patch b/kdelibs-4.7.1-CVE-2011-3365.patch new file mode 100644 index 0000000..f01d6f1 --- /dev/null +++ b/kdelibs-4.7.1-CVE-2011-3365.patch @@ -0,0 +1,84 @@ +commit 9ca2b26fc67c3f921e1943c1725fca623e395854 +Author: David Faure +Date: Thu Jun 30 23:43:45 2011 +0200 + + Security fix: don't interpret html tags + + Credits to Tim Brown for the find. + (cherry picked from commit bd70d4e589711fda9ab07738c46e37eee8376214) + +diff --git a/kio/kssl/ksslcertificatebox.cpp b/kio/kssl/ksslcertificatebox.cpp +index 4ffc613..094787a 100644 +--- a/kio/kssl/ksslcertificatebox.cpp ++++ b/kio/kssl/ksslcertificatebox.cpp +@@ -36,6 +36,10 @@ KSslCertificateBox::KSslCertificateBox(QWidget *parent) + d(new KSslCertificateBoxPrivate()) + { + d->ui.setupUi(this); ++ // No fooling us with html tags ++ Q_FOREACH(QLabel* label, qFindChildren(this)) { ++ label->setTextFormat(Qt::PlainText); ++ } + } + + +commit 90607b28d21fefc43657ca08b889bdb174c31fab +Author: David Faure +Date: Wed Sep 28 17:26:47 2011 +0200 + + Use HTML escaping on texts that come from the website + + Interestingly enough, this is yet another use case for moving Qt::escape + to QtCore, which I made a merge request for. + (cherry picked from commit 86622e4db182f4b914169f72ebd1e66d708e9f87) + +diff --git a/kioslave/http/http.cpp b/kioslave/http/http.cpp +index 33f4cb1..6447a02 100644 +--- a/kioslave/http/http.cpp ++++ b/kioslave/http/http.cpp +@@ -99,6 +99,27 @@ + //authentication handlers + #include "httpauthentication.cpp" + ++// KDE5 TODO (QT5) : use QString::htmlEscape or whatever https://qt.gitorious.org/qt/qtbase/merge_requests/56 ++// ends up with. ++static QString htmlEscape(const QString &plain) ++{ ++ QString rich; ++ rich.reserve(int(plain.length() * 1.1)); ++ for (int i = 0; i < plain.length(); ++i) { ++ if (plain.at(i) == QLatin1Char('<')) ++ rich += QLatin1String("<"); ++ else if (plain.at(i) == QLatin1Char('>')) ++ rich += QLatin1String(">"); ++ else if (plain.at(i) == QLatin1Char('&')) ++ rich += QLatin1String("&"); ++ else if (plain.at(i) == QLatin1Char('"')) ++ rich += QLatin1String("""); ++ else ++ rich += plain.at(i); ++ } ++ rich.squeeze(); ++ return rich; ++} + + // see filenameFromUrl(): a sha1 hash is 160 bits + static const int s_hashedUrlBits = 160; // this number should always be divisible by eight +@@ -3410,7 +3431,7 @@ endParsing: + authinfo.url = reqUrl; + authinfo.keepPassword = true; + authinfo.comment = i18n("%1 at %2", +- authinfo.realmValue, authinfo.url.host()); ++ htmlEscape(authinfo.realmValue), authinfo.url.host()); + + if (!openPasswordDialog(authinfo, errorMsg)) { + if (sendErrorPageNotification()) { +@@ -5122,7 +5143,7 @@ void HTTPProtocol::proxyAuthenticationForSocket(const QNetworkProxy &proxy, QAut + "to access any sites."); + info.keepPassword = true; + info.commentLabel = i18n("Proxy:"); +- info.comment = i18n("%1 at %2", info.realmValue, m_request.proxyUrl.host()); ++ info.comment = i18n("%1 at %2", htmlEscape(info.realmValue), m_request.proxyUrl.host()); + const bool dataEntered = openPasswordDialog(info, i18n("Proxy Authentication Failed.")); + if (!dataEntered) { + kDebug(7103) << "looks like the user canceled proxy authentication."; diff --git a/kdelibs.spec b/kdelibs.spec index 0bcaee6..83e5a2b 100644 --- a/kdelibs.spec +++ b/kdelibs.spec @@ -20,7 +20,7 @@ Summary: KDE Libraries Version: 4.7.1 -Release: 5%{?dist} +Release: 6%{?dist} Name: kdelibs Epoch: 6 @@ -127,6 +127,9 @@ Patch51: kdelibs-4.6.2-uri_mimetypes.patch # Not Upstreamed? why not ? -- Rex Patch200: kdelibs-4.3.1-CVE-2009-2702.patch +# kdelibs KSSL/kio_http vulnerability +Patch201: kdelibs-4.7.1-CVE-2011-3365.patch + ## Fedora specific patches # make forcefully hal-free build Patch300: kdelibs-4.6.80-halectomy.patch @@ -314,8 +317,9 @@ sed -i -e "s|@@VERSION_RELEASE@@|%{version}-%{release}|" kio/kio/kprotocolmanage # upstream patches -# security fix +# security fixes %patch200 -p1 -b .CVE-2009-2702 +%patch201 -p1 -b .CVE-2011-3365 # Fedora patches %patch300 -p1 -b .halectomy @@ -562,6 +566,9 @@ rm -rf %{buildroot} %changelog +* Tue Oct 04 2011 Lukas Tinkl - 4.7.1-6 +- Resolves #743056 - CVE-2011-3365 kdelibs: input validation failure in KSSL + * Wed Sep 28 2011 Rex Dieter 4.7.1-5 - -devel: s/pkgconfig(attica)/pkgconfig(libattica)/