[libgda: 1/2] Fix CVE-2021-39359 by forcing TLS certificate validation
- From: Daniel Espinosa Ortiz <despinosa src gnome org>
- To: commits-list gnome org
- Cc:
- Subject: [libgda: 1/2] Fix CVE-2021-39359 by forcing TLS certificate validation
- Date: Wed, 20 Oct 2021 23:02:46 +0000 (UTC)
commit bebdffb4de586fb43fd07ac549121f4b22f6812d
Author: Douglas R. Reno <renodr linuxfromscratch org>
Date: Mon Oct 18 13:18:01 2021 -0500
Fix CVE-2021-39359 by forcing TLS certificate validation
This was done by adding "ssl-use-system-ca-file", TRUE to the options
for each soup_session_new_with_options() call that was made.
Tested on Linux From Scratch 11.0 and Debian 11.
Fixes #249
providers/web/gda-web-provider.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
---
diff --git a/providers/web/gda-web-provider.c b/providers/web/gda-web-provider.c
index cf8d14dc3..cc818895f 100644
--- a/providers/web/gda-web-provider.c
+++ b/providers/web/gda-web-provider.c
@@ -355,8 +355,8 @@ gda_web_provider_open_connection (GdaServerProvider *provider, GdaConnection *cn
g_rec_mutex_init (& (cdata->mutex));
cdata->server_id = NULL;
cdata->forced_closing = FALSE;
- cdata->worker_session = soup_session_new ();
- cdata->front_session = soup_session_new_with_options ("max-conns-per-host", 1, NULL);
+ cdata->worker_session = soup_session_new_with_options ("ssl-use-system-ca-file", TRUE, NULL);
+ cdata->front_session = soup_session_new_with_options ("max-conns-per-host", 1,
"ssl-use-system-ca-file", TRUE, NULL);
if (use_ssl) {
server_url = g_string_new ("https://");
g_print ("USING SSL\n");
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]