[csw-devel] SF.net SVN: gar:[21491] csw/mgar/pkg/gnutls/trunk
chninkel at users.sourceforge.net
chninkel at users.sourceforge.net
Thu Jul 11 00:44:38 CEST 2013
Revision: 21491
http://gar.svn.sourceforge.net/gar/?rev=21491&view=rev
Author: chninkel
Date: 2013-07-10 22:44:38 +0000 (Wed, 10 Jul 2013)
Log Message:
-----------
gnutls/trunk: added security fix for CVE-2013-2116
Modified Paths:
--------------
csw/mgar/pkg/gnutls/trunk/Makefile
Added Paths:
-----------
csw/mgar/pkg/gnutls/trunk/files/0005-CVE-2013-2116.patch
Modified: csw/mgar/pkg/gnutls/trunk/Makefile
===================================================================
--- csw/mgar/pkg/gnutls/trunk/Makefile 2013-07-10 21:53:26 UTC (rev 21490)
+++ csw/mgar/pkg/gnutls/trunk/Makefile 2013-07-10 22:44:38 UTC (rev 21491)
@@ -28,6 +28,8 @@
# We workaround the problem by changing the test so it expects
# the certificates to be expired (another solution is to use LD_PRELOAD).
PATCHFILES += 0004-workaround-certificate-expiration-issue-in-the-test-.patch
+# Security fix for CVE-2013-2116
+PATCHFILES += 0005-CVE-2013-2116.patch
UFILES_REGEX = $(NAME)-(\d+(?:\.\d+)*).tar.bz2
Added: csw/mgar/pkg/gnutls/trunk/files/0005-CVE-2013-2116.patch
===================================================================
--- csw/mgar/pkg/gnutls/trunk/files/0005-CVE-2013-2116.patch (rev 0)
+++ csw/mgar/pkg/gnutls/trunk/files/0005-CVE-2013-2116.patch 2013-07-10 22:44:38 UTC (rev 21491)
@@ -0,0 +1,25 @@
+From 5164d5a1d57cd0372a5dd074382ca960ca18b27d Mon Sep 17 00:00:00 2001
+From: Nikos Mavrogiannopoulos <nmav at gnutls.org>
+Date: Thu, 23 May 2013 09:54:37 +0200
+Subject: [PATCH] re-applied sanity check patch
+
+---
+ lib/gnutls_cipher.c | 2 ++
+ 1 files changed, 2 insertions(+), 0 deletions(-)
+
+diff --git a/lib/gnutls_cipher.c b/lib/gnutls_cipher.c
+index 2835121..71f5a98 100644
+--- a/lib/gnutls_cipher.c
++++ b/lib/gnutls_cipher.c
+@@ -561,6 +561,8 @@ _gnutls_ciphertext2compressed (gnutls_session_t session,
+ return GNUTLS_E_DECRYPTION_FAILED;
+ }
+ pad = ciphertext.data[ciphertext.size - 1]; /* pad */
++ if (pad+1 > ciphertext.size-hash_size)
++ pad_failed = GNUTLS_E_DECRYPTION_FAILED;
+
+ /* Check the pading bytes (TLS 1.x).
+ * Note that we access all 256 bytes of ciphertext for padding check
+--
+1.7.1
+
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the devel
mailing list