#46 [F37] Update to 7.3.12
Closed 9 months ago by churchyard. Opened 9 months ago by churchyard.

@@ -0,0 +1,131 @@ 

+ From 71b1e29f61ee1fa7d70a0b00bdbca5eddf107076 Mon Sep 17 00:00:00 2001

+ From: Lumir Balhar <lbalhar@redhat.com>

+ Date: Thu, 25 May 2023 10:03:57 +0200

+ Subject: [PATCH] 00399-cve-2023-24329.patch

+ 

+ 00399 #

+ 

+ * gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

+ 

+ `urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

+ 

+ This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

+ 

+ Backported to Python 2 from Python 3.12.

+ 

+ Co-authored-by: Illia Volochii <illia.volochii@gmail.com>

+ Co-authored-by: Gregory P. Smith [Google] <greg@krypto.org>

+ Co-authored-by: Lumir Balhar <lbalhar@redhat.com>

+ ---

+  lib-python/2.7/test/test_urlparse.py | 59 ++++++++++++++++++++++++++++

+  lib-python/2.7/urlparse.py           | 10 +++++

+  2 files changed, 69 insertions(+)

+ 

+ diff --git a/lib-python/2.7/test/test_urlparse.py b/lib-python/2.7/test/test_urlparse.py

+ index 9912fe2..94fe940 100644

+ --- a/lib-python/2.7/test/test_urlparse.py

+ +++ b/lib-python/2.7/test/test_urlparse.py

+ @@ -572,6 +572,65 @@ class UrlParseTestCase(unittest.TestCase):

+          self.assertEqual(p.port, None)

+          self.assertEqual(p.geturl(), b"http://www.python.org/javascript:alert('msg')/#frag")

+  

+ +    def test_urlsplit_strip_url(self):

+ +        noise = "".join([chr(i) for i in range(0, 0x20 + 1)])

+ +        base_url = "http://User:Pass@www.python.org:080/doc/?query=yes#frag"

+ +

+ +        url = noise.decode("utf-8") + base_url

+ +        p = urlparse.urlsplit(url)

+ +        self.assertEqual(p.scheme, "http")

+ +        self.assertEqual(p.netloc, "User:Pass@www.python.org:080")

+ +        self.assertEqual(p.path, "/doc/")

+ +        self.assertEqual(p.query, "query=yes")

+ +        self.assertEqual(p.fragment, "frag")

+ +        self.assertEqual(p.username, "User")

+ +        self.assertEqual(p.password, "Pass")

+ +        self.assertEqual(p.hostname, "www.python.org")

+ +        self.assertEqual(p.port, 80)

+ +        self.assertEqual(p.geturl(), base_url)

+ +

+ +        url = noise + base_url.encode("utf-8")

+ +        p = urlparse.urlsplit(url)

+ +        self.assertEqual(p.scheme, b"http")

+ +        self.assertEqual(p.netloc, b"User:Pass@www.python.org:080")

+ +        self.assertEqual(p.path, b"/doc/")

+ +        self.assertEqual(p.query, b"query=yes")

+ +        self.assertEqual(p.fragment, b"frag")

+ +        self.assertEqual(p.username, b"User")

+ +        self.assertEqual(p.password, b"Pass")

+ +        self.assertEqual(p.hostname, b"www.python.org")

+ +        self.assertEqual(p.port, 80)

+ +        self.assertEqual(p.geturl(), base_url.encode("utf-8"))

+ +

+ +        # Test that trailing space is preserved as some applications rely on

+ +        # this within query strings.

+ +        query_spaces_url = "https://www.python.org:88/doc/?query=    "

+ +        p = urlparse.urlsplit(noise.decode("utf-8") + query_spaces_url)

+ +        self.assertEqual(p.scheme, "https")

+ +        self.assertEqual(p.netloc, "www.python.org:88")

+ +        self.assertEqual(p.path, "/doc/")

+ +        self.assertEqual(p.query, "query=    ")

+ +        self.assertEqual(p.port, 88)

+ +        self.assertEqual(p.geturl(), query_spaces_url)

+ +

+ +        p = urlparse.urlsplit("www.pypi.org ")

+ +        # That "hostname" gets considered a "path" due to the

+ +        # trailing space and our existing logic...  YUCK...

+ +        # and re-assembles via geturl aka unurlsplit into the original.

+ +        # django.core.validators.URLValidator (at least through v3.2) relies on

+ +        # this, for better or worse, to catch it in a ValidationError via its

+ +        # regular expressions.

+ +        # Here we test the basic round trip concept of such a trailing space.

+ +        self.assertEqual(urlparse.urlunsplit(p), "www.pypi.org ")

+ +

+ +        # with scheme as cache-key

+ +        url = "//www.python.org/"

+ +        scheme = noise.decode("utf-8") + "https" + noise.decode("utf-8")

+ +        for _ in range(2):

+ +            p = urlparse.urlsplit(url, scheme=scheme)

+ +            self.assertEqual(p.scheme, "https")

+ +            self.assertEqual(p.geturl(), "https://www.python.org/")

+ +

+      def test_attributes_bad_port(self):

+          """Check handling of non-integer ports."""

+          p = urlparse.urlsplit("http://www.example.net:foo")

+ diff --git a/lib-python/2.7/urlparse.py b/lib-python/2.7/urlparse.py

+ index 6f6c435..5adf78d 100644

+ --- a/lib-python/2.7/urlparse.py

+ +++ b/lib-python/2.7/urlparse.py

+ @@ -26,6 +26,10 @@ scenarios for parsing, and for backward compatibility purposes, some

+  parsing quirks from older RFCs are retained. The testcases in

+  test_urlparse.py provides a good indicator of parsing behavior.

+  

+ +The WHATWG URL Parser spec should also be considered.  We are not compliant with

+ +it either due to existing user code API behavior expectations (Hyrum's Law).

+ +It serves as a useful guide when making changes.

+ +

+  """

+  

+  import re

+ @@ -62,6 +66,10 @@ scheme_chars = ('abcdefghijklmnopqrstuvwxyz'

+                  '0123456789'

+                  '+-.')

+  

+ +# Leading and trailing C0 control and space to be stripped per WHATWG spec.

+ +# == "".join([chr(i) for i in range(0, 0x20 + 1)])

+ +_WHATWG_C0_CONTROL_OR_SPACE = '\x00\x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f '

+ +

+  # Unsafe bytes to be removed per WHATWG spec

+  _UNSAFE_URL_BYTES_TO_REMOVE = ['\t', '\r', '\n']

+  

+ @@ -193,6 +201,8 @@ def urlsplit(url, scheme='', allow_fragments=True):

+      Return a 5-tuple: (scheme, netloc, path, query, fragment).

+      Note that we don't break the components up in smaller bits

+      (e.g. netloc is a single string) and we don't expand % escapes."""

+ +    url = url.lstrip(_WHATWG_C0_CONTROL_OR_SPACE)

+ +    scheme = scheme.strip(_WHATWG_C0_CONTROL_OR_SPACE)

+      allow_fragments = bool(allow_fragments)

+      key = url, scheme, allow_fragments, type(url), type(scheme)

+      cached = _parse_cache.get(key, None)

+ -- 

+ 2.40.1

+ 

file modified
+29 -31
@@ -4,7 +4,7 @@ 

  # %%{_libdir}/pypy%%{pyversion} (see e.g. pypy3.7 or pypy3.8 for inspiration).

  %global basever 7.3

  Name:           pypy

- Version:        %{basever}.11

+ Version:        %{basever}.12

  %global pyversion 2.7

  Release:        1%{?dist}

  Summary:        Python implementation with a Just-In-Time compiler
@@ -20,12 +20,10 @@ 

  # before building).  If we restore those we'll have to work out the new

  # licensing terms

  License:        MIT and Python and UCD and BSD and (ASL 2.0 or BSD)

- URL:            http://pypy.org/

+ URL:            https://www.pypy.org/

  

  # https://fedoraproject.org/wiki/Changes/EncourageI686LeafRemoval

- %if 0%{?fedora} >= 37 || 0%{?rhel} >= 10

  ExcludeArch:    %{ix86}

- %endif

  

  # High-level configuration of the build:

  
@@ -132,10 +130,6 @@ 

  # Easy way to enable/disable verbose logging:

  %global verbose_logs 0

  

- # Forcibly use the shadow-stack option for detecting GC roots, rather than

- # relying on hacking up generated assembler with regexps:

- %global shadow_stack 1

- 

  # Easy way to turn off the selftests:

  %global run_selftests 1

  
@@ -192,6 +186,18 @@ 

  # Backported from python3.

  Patch382: 382-cve-2015-20107.patch

  

+ # 00399 #

+ # CVE-2023-24329

+ #

+ # gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508)

+ #

+ # `urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595.

+ #

+ # This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%%20any%%20leading%%20and%%20trailing%%20C0%%20control%%20or%%20space%%20from%%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).

+ #

+ # Backported from Python 3.12

+ Patch399: 399-cve-2023-24329.patch

+ 

  # Build-time requirements:

  

  # pypy's can be rebuilt using itself, rather than with CPython; doing so
@@ -359,7 +365,7 @@ 

  %endif

  

  # Find the version in lib_pypy/cffi/_pycparser/__init__.py

- Provides: bundled(python2dist(pycparser)) = 2.20

+ Provides: bundled(python2dist(pycparser)) = 2.21

  

  # Find the version in lib_pypy/cffi/_pycparser/ply/__init__.py

  Provides: bundled(python2dist(ply)) = 3.9
@@ -502,7 +508,6 @@ 

    # How will we track garbage-collection roots in the generated code?

    #   http://pypy.readthedocs.org/en/latest/config/translation.gcrootfinder.html

  

- %if 0%{shadow_stack}

    # This is the most portable option, and avoids a reliance on non-guaranteed

    # behaviors within GCC's code generator: use an explicitly-maintained stack

    # of root pointers:
@@ -510,27 +515,6 @@ 

  

    export CFLAGS=$(echo "$RPM_OPT_FLAGS" | sed -e 's/-g//')

  

- %else

-   # Go with the default, which is "asmgcc"

- 

-   %global gcrootfinder_options %{nil}

- 

-   # https://bugzilla.redhat.com/show_bug.cgi?id=588941#c18

-   # The generated Makefile compiles the .c files into assembler (.s), rather

-   # than direct to .o  It then post-processes this assembler to locate

-   # garbage-collection roots (building .lbl.s and .gcmap files, and a

-   # "gcmaptable.s").  (The modified .lbl.s files have extra code injected

-   # within them).

-   # Unfortunately, the code to do this:

-   #   pypy-1.4/pypy/translator/c/gcc/trackgcroot.py

-   # doesn't interract well with the results of using our standard build flags.

-   # For now, filter our CFLAGS of everything that could be conflicting with

-   # pypy.  Need to check these and reenable ones that are okay later.

-   # Filed as https://bugzilla.redhat.com/show_bug.cgi?id=666966

-   export CFLAGS=$(echo "$RPM_OPT_FLAGS" | sed -e 's/-Wp,-D_FORTIFY_SOURCE=2//' -e 's/-fexceptions//' -e 's/-fstack-protector//' -e 's/--param=ssp-buffer-size=4//' -e 's/-O2//' -e 's/-fasynchronous-unwind-tables//' -e 's/-march=i686//' -e 's/-mtune=atom//')

- 

- %endif

- 

    # The generated C code leads to many thousands of warnings of the form:

    #   warning: variable 'l_v26003' set but not used [-Wunused-but-set-variable]

    # Suppress them:
@@ -893,6 +877,20 @@ 

  

  

  %changelog

+ * Wed Jul 26 2023 Miro Hrončok <mhroncok@redhat.com> - 7.3.12-1

+ - Update to 7.3.12

+ - Fixes: rhbz#2203422

+ 

+ * Fri Jul 21 2023 Fedora Release Engineering <releng@fedoraproject.org> - 7.3.11-4

+ - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild

+ 

+ * Mon May 29 2023 Charalampos Stratakis <cstratak@redhat.com> - 7.3.11-3

+ - Security fix for CVE-2023-24329

+ Resolves: rhbz#2174018

+ 

+ * Fri Jan 20 2023 Fedora Release Engineering <releng@fedoraproject.org> - 7.3.11-2

+ - Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild

+ 

  * Fri Dec 30 2022 Miro Hrončok <mhroncok@redhat.com> - 7.3.11-1

  - Update to 7.3.11

  - Fixes: rhbz#2147521

file modified
+1 -1
@@ -1,1 +1,1 @@ 

- SHA512 (pypy2.7-v7.3.11-src.tar.bz2) = 31fd93fe3e761fd096ff52c2a0afa40f78e4df700deb911e221d1682b35e8374c9deac7ba19b474f7ca7a366d3ae9b36ebaf78e81c4ec8306431fd0873daea55

+ SHA512 (pypy2.7-v7.3.12-src.tar.bz2) = 35ec35376f1e7c1a5dea9dc5bce6819a94c2df2645806c83185487587470b47ab529c25ecb8ca200505319f40789859a2919c61902b693421e2001313b46e5f4

no initial comment

Merge Failed.

This change or one of its cross-repo dependencies was unable to be automatically merged with the current state of its repository. Please rebase the change and upload a new patchset.
Warning:
Error merging src.fedoraproject.org/rpms/pypy for 46,934d69d

Apparently, this branch is already diverged :(

Will rebase later.

Pull-Request has been closed by churchyard

9 months ago