pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/www/ruby-actionpack Security fix for:



details:   https://anonhg.NetBSD.org/pkgsrc/rev/d332c4066893
branches:  trunk
changeset: 395914:d332c4066893
user:      minskim <minskim%pkgsrc.org@localhost>
date:      Thu Jul 16 11:00:25 2009 +0000

description:
Security fix for:
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422

>From rails git commit 056ddbdcfb07f0b5c7e6ed8a35f6c3b55b4ab489.

diffstat:

 www/ruby-actionpack/Makefile         |   7 ++++++-
 www/ruby-actionpack/distinfo         |   3 ++-
 www/ruby-actionpack/patches/patch-aa |  24 ++++++++++++++++++++++++
 3 files changed, 32 insertions(+), 2 deletions(-)

diffs (62 lines):

diff -r 45c6b028141e -r d332c4066893 www/ruby-actionpack/Makefile
--- a/www/ruby-actionpack/Makefile      Thu Jul 16 10:51:17 2009 +0000
+++ b/www/ruby-actionpack/Makefile      Thu Jul 16 11:00:25 2009 +0000
@@ -1,7 +1,8 @@
-# $NetBSD: Makefile,v 1.15 2009/04/07 17:13:27 minskim Exp $
+# $NetBSD: Makefile,v 1.16 2009/07/16 11:00:25 minskim Exp $
 
 DISTNAME=      actionpack-2.3.2
 PKGNAME=       ${RUBY_PKGPREFIX}-${DISTNAME}
+PKGREVISION=   1
 CATEGORIES=    www
 
 MAINTAINER=    minskim%NetBSD.org@localhost
@@ -11,4 +12,8 @@
 DEPENDS+=      ${RUBY_PKGPREFIX}-activesupport>=2.3.2:../../devel/ruby-activesupport
 
 .include "../../misc/rubygems/rubygem.mk"
+
+pre-configure:
+       ${RM} ${WRKSRC}/lib/action_controller/http_authentication.rb.orig
+
 .include "../../mk/bsd.pkg.mk"
diff -r 45c6b028141e -r d332c4066893 www/ruby-actionpack/distinfo
--- a/www/ruby-actionpack/distinfo      Thu Jul 16 10:51:17 2009 +0000
+++ b/www/ruby-actionpack/distinfo      Thu Jul 16 11:00:25 2009 +0000
@@ -1,6 +1,7 @@
-$NetBSD: distinfo,v 1.16 2009/04/07 17:13:27 minskim Exp $
+$NetBSD: distinfo,v 1.17 2009/07/16 11:00:25 minskim Exp $
 
 SHA1 (actionpack-2.3.2.gem) = 31e9815ed5d901b6b7f618bb7140f16d1a79ebfc
 RMD160 (actionpack-2.3.2.gem) = 800602f5c03b08ca8ca292cc7f82ef009c0e2160
 Size (actionpack-2.3.2.gem) = 767488 bytes
+SHA1 (patch-aa) = 85d3a5a5766a6ac220e230436f53f6cd4078a259
 SHA1 (patch-ab) = bfba841b0af9d503a71745cc8d992e9d09d94191
diff -r 45c6b028141e -r d332c4066893 www/ruby-actionpack/patches/patch-aa
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/www/ruby-actionpack/patches/patch-aa      Thu Jul 16 11:00:25 2009 +0000
@@ -0,0 +1,24 @@
+$NetBSD: patch-aa,v 1.3 2009/07/16 11:00:25 minskim Exp $
+
+http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2422
+rails git commit 056ddbdcfb07f0b5c7e6ed8a35f6c3b55b4ab489
+
+--- lib/action_controller/http_authentication.rb.orig  2009-07-16 03:45:19.000000000 -0700
++++ lib/action_controller/http_authentication.rb
+@@ -183,7 +183,7 @@ module ActionController
+         request.env['REDIRECT_X_HTTP_AUTHORIZATION']
+       end
+ 
+-      # Raises error unless the request credentials response value matches the expected value.
++      # Returns false unless the request credentials response value matches the expected value.
+       # First try the password as a ha1 digest password. If this fails, then try it as a plain
+       # text password.
+       def validate_digest_response(request, realm, &password_procedure)
+@@ -192,6 +192,7 @@ module ActionController
+ 
+         if valid_nonce && realm == credentials[:realm] && opaque == credentials[:opaque]
+           password = password_procedure.call(credentials[:username])
++          return false unless password
+ 
+          [true, false].any? do |password_is_ha1|
+            expected = expected_response(request.env['REQUEST_METHOD'], request.env['REQUEST_URI'], credentials, password, password_is_ha1)



Home | Main Index | Thread Index | Old Index