From 9a53a79fc54e01932bd727ec519403ea4c2c3efc Mon Sep 17 00:00:00 2001 From: Efraim Flashner Date: Tue, 9 Aug 2022 22:39:26 +0300 Subject: gnu: gnupg: Patch CVE-2022-34903. * gnu/packages/gnupg.scm (gnupg)[replacement]: New field. (gnupg/replacement): New variable. * gnu/packages/patches/gnupg-CVE-2022-34903.patch: New file. * gnu/local.mk (dist_patch_DATA): Register it. --- gnu/local.mk | 1 + gnu/packages/gnupg.scm | 10 +++++ gnu/packages/patches/gnupg-CVE-2022-34903.patch | 54 +++++++++++++++++++++++++ 3 files changed, 65 insertions(+) create mode 100644 gnu/packages/patches/gnupg-CVE-2022-34903.patch (limited to 'gnu') diff --git a/gnu/local.mk b/gnu/local.mk index f907c8b635..caf5fd68b0 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1213,6 +1213,7 @@ dist_patch_DATA = \ %D%/packages/patches/gnome-session-support-elogind.patch \ %D%/packages/patches/gnome-todo-libportal.patch \ %D%/packages/patches/gnome-tweaks-search-paths.patch \ + %D%/packages/patches/gnupg-CVE-2022-34903.patch \ %D%/packages/patches/gnupg-default-pinentry.patch \ %D%/packages/patches/gnupg-1-build-with-gcc10.patch \ %D%/packages/patches/gnutls-skip-trust-store-test.patch \ diff --git a/gnu/packages/gnupg.scm b/gnu/packages/gnupg.scm index 08fa1570d6..90215a6877 100644 --- a/gnu/packages/gnupg.scm +++ b/gnu/packages/gnupg.scm @@ -285,6 +285,7 @@ (define-public gnupg ;; Note2: 2.2.33 currently suffers from regressions, so do not update to it ;; (see: https://dev.gnupg.org/T5742). (version "2.2.32") + (replacement gnupg/fixed) (source (origin (method url-fetch) (uri (string-append "ftp://ftp.gnupg.org/gcrypt/gnupg/gnupg-" version @@ -352,6 +353,15 @@ (define-public gnupg (properties '((ftp-server . "ftp.gnupg.org") (ftp-directory . "/gcrypt/gnupg"))))) +(define gnupg/fixed + (package + (inherit gnupg) + (source (origin + (inherit (package-source gnupg)) + (patches + (append (origin-patches (package-source gnupg)) + (search-patches "gnupg-CVE-2022-34903.patch"))))))) + (define-public gnupg-1 (package (inherit gnupg) (version "1.4.23") diff --git a/gnu/packages/patches/gnupg-CVE-2022-34903.patch b/gnu/packages/patches/gnupg-CVE-2022-34903.patch new file mode 100644 index 0000000000..19c055282a --- /dev/null +++ b/gnu/packages/patches/gnupg-CVE-2022-34903.patch @@ -0,0 +1,54 @@ +https://dev.gnupg.org/T6027 +https://www.openwall.com/lists/oss-security/2022/06/30/1 +https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=34c649b3601383cd11dbc76221747ec16fd68e1b + +From 34c649b3601383cd11dbc76221747ec16fd68e1b Mon Sep 17 00:00:00 2001 +From: Werner Koch +Date: Tue, 14 Jun 2022 11:33:27 +0200 +Subject: [PATCH] g10: Fix garbled status messages in NOTATION_DATA + +* g10/cpr.c (write_status_text_and_buffer): Fix off-by-one +-- + +Depending on the escaping and line wrapping the computed remaining +buffer length could be wrong. Fixed by always using a break to +terminate the escape detection loop. Might have happened for all +status lines which may wrap. + +GnuPG-bug-id: T6027 +--- + g10/cpr.c | 13 ++++--------- + 1 file changed, 4 insertions(+), 9 deletions(-) + +diff --git a/g10/cpr.c b/g10/cpr.c +index 9bfdd3c34..fa8005d6f 100644 +--- a/g10/cpr.c ++++ b/g10/cpr.c +@@ -372,20 +372,15 @@ write_status_text_and_buffer (int no, const char *string, + } + first = 0; + } +- for (esc=0, s=buffer, n=len; n && !esc; s++, n--) ++ for (esc=0, s=buffer, n=len; n; s++, n--) + { + if (*s == '%' || *(const byte*)s <= lower_limit + || *(const byte*)s == 127 ) + esc = 1; + if (wrap && ++count > wrap) +- { +- dowrap=1; +- break; +- } +- } +- if (esc) +- { +- s--; n++; ++ dowrap=1; ++ if (esc || dowrap) ++ break; + } + if (s != buffer) + es_fwrite (buffer, s-buffer, 1, statusfp); +-- +2.11.0 + -- cgit v1.2.3