[Pkg-gnupg-commit] r305 - in /gnupg/branches/squeeze/debian: changelog patches/00list patches/CVE-2012-6085.dpatch

thijs at users.alioth.debian.org thijs at users.alioth.debian.org
Wed Jan 2 19:46:44 UTC 2013


Author: thijs
Date: Wed Jan  2 19:46:44 2013
New Revision: 305

URL: http://svn.debian.org/wsvn/pkg-gnupg/?sc=1&rev=305
Log:
Apply upstream patch to fix memory and key database corruption
when importing with invalid keys (CVE-2012-6085, closes: #697108).

Added:
    gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch   (with props)
Modified:
    gnupg/branches/squeeze/debian/changelog
    gnupg/branches/squeeze/debian/patches/00list

Modified: gnupg/branches/squeeze/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnupg/gnupg/branches/squeeze/debian/changelog?rev=305&op=diff
==============================================================================
--- gnupg/branches/squeeze/debian/changelog (original)
+++ gnupg/branches/squeeze/debian/changelog Wed Jan  2 19:46:44 2013
@@ -1,3 +1,10 @@
+gnupg (1.4.10-4+squeeze1) stable-security; urgency=high
+
+  * Apply upstream patch to fix memory and key database corruption
+    when importing with invalid keys (CVE-2012-6085, closes: #697108).
+
+ -- Thijs Kinkhorst <thijs at debian.org>  Wed, 02 Jan 2013 20:43:39 +0100
+
 gnupg (1.4.10-4) unstable; urgency=high
 
   * debian/patches/mips_gcc4.4: added to fix build failure on

Modified: gnupg/branches/squeeze/debian/patches/00list
URL: http://svn.debian.org/wsvn/pkg-gnupg/gnupg/branches/squeeze/debian/patches/00list?rev=305&op=diff
==============================================================================
--- gnupg/branches/squeeze/debian/patches/00list (original)
+++ gnupg/branches/squeeze/debian/patches/00list Wed Jan  2 19:46:44 2013
@@ -7,3 +7,4 @@
 567593_improve_info_and_faq
 fix_infinite_loop_r5264
 mips_gcc4.4
+CVE-2012-6085

Added: gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch
URL: http://svn.debian.org/wsvn/pkg-gnupg/gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch?rev=305&op=file
==============================================================================
--- gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch (added)
+++ gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch Wed Jan  2 19:46:44 2013
@@ -1,0 +1,47 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## mips_gcc4.4 by Werner Koch
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: Fix memory and key database corruption on importing invalid keys
+## DP: by rejecting invalid keyblock packet types.
+## DP: <URL:http://bugs.debian.org/697108>
+
+--- a/g10/import.c
++++ b/g10/import.c
+@@ -343,6 +343,27 @@ import_print_stats (void *hd)
+ }
+ 
+ 
++/* Return true if PKTTYPE is valid in a keyblock.  */
++static int
++valid_keyblock_packet (int pkttype)
++{
++  switch (pkttype)
++    {
++    case PKT_PUBLIC_KEY:
++    case PKT_PUBLIC_SUBKEY:
++    case PKT_SECRET_KEY:
++    case PKT_SECRET_SUBKEY:
++    case PKT_SIGNATURE:
++    case PKT_USER_ID:
++    case PKT_ATTRIBUTE:
++    case PKT_RING_TRUST:
++      return 1;
++    default:
++      return 0;
++    }
++}
++
++
+ /****************
+  * Read the next keyblock from stream A.
+  * PENDING_PKT should be initialzed to NULL
+@@ -420,7 +441,7 @@ read_block( IOBUF a, PACKET **pending_pkt, KBNODE *ret_root )
+ 	    }
+ 	    in_cert = 1;
+ 	  default:
+-	    if( in_cert ) {
++	    if (in_cert && valid_keyblock_packet (pkt->pkttype)) {
+ 		if( !root )
+ 		    root = new_kbnode( pkt );
+ 		else

Propchange: gnupg/branches/squeeze/debian/patches/CVE-2012-6085.dpatch
------------------------------------------------------------------------------
    svn:executable = *




More information about the Pkg-gnupg-commit mailing list