pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: [pkgsrc-2017Q1] pkgsrc/security/libtomcrypt



Module Name:    pkgsrc
Committed By:   bsiegert
Date:           Sat Jun  3 18:03:48 UTC 2017

Modified Files:
        pkgsrc/security/libtomcrypt [pkgsrc-2017Q1]: Makefile distinfo
Added Files:
        pkgsrc/security/libtomcrypt/patches [pkgsrc-2017Q1]:
            patch-src_pk_rsa_rsa__verify__hash.c

Log Message:
Pullup ticket #5451 - requested by sevan
security/libtomcrypt: security fix

Revisions pulled up:
- security/libtomcrypt/Makefile                                 1.7
- security/libtomcrypt/distinfo                                 1.6
- security/libtomcrypt/patches/patch-src_pk_rsa_rsa__verify__hash.c 1.1

---
   Module Name:    pkgsrc
   Committed By:   snj
   Date:           Tue May 16 21:55:50 UTC 2017

   Modified Files:
           pkgsrc/security/libtomcrypt: Makefile distinfo
   Added Files:
           pkgsrc/security/libtomcrypt/patches:
               patch-src_pk_rsa_rsa__verify__hash.c

   Log Message:
   Fix CVE-2016-6129.  Bump PKGREVISION to 3.


To generate a diff of this commit:
cvs rdiff -u -r1.6 -r1.6.20.1 pkgsrc/security/libtomcrypt/Makefile
cvs rdiff -u -r1.5 -r1.5.12.1 pkgsrc/security/libtomcrypt/distinfo
cvs rdiff -u -r0 -r1.1.2.2 \
    pkgsrc/security/libtomcrypt/patches/patch-src_pk_rsa_rsa__verify__hash.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/libtomcrypt/Makefile
diff -u pkgsrc/security/libtomcrypt/Makefile:1.6 pkgsrc/security/libtomcrypt/Makefile:1.6.20.1
--- pkgsrc/security/libtomcrypt/Makefile:1.6    Tue Dec 16 02:58:20 2014
+++ pkgsrc/security/libtomcrypt/Makefile        Sat Jun  3 18:03:48 2017
@@ -1,8 +1,8 @@
-# $NetBSD: Makefile,v 1.6 2014/12/16 02:58:20 mef Exp $
+# $NetBSD: Makefile,v 1.6.20.1 2017/06/03 18:03:48 bsiegert Exp $
 
 DISTNAME=      crypt-1.17
 PKGNAME=       libtom${DISTNAME}
-PKGREVISION=   2
+PKGREVISION=   3
 CATEGORIES=    security
 MASTER_SITES=  http://libtom.org/files/
 EXTRACT_SUFX=  .tar.bz2

Index: pkgsrc/security/libtomcrypt/distinfo
diff -u pkgsrc/security/libtomcrypt/distinfo:1.5 pkgsrc/security/libtomcrypt/distinfo:1.5.12.1
--- pkgsrc/security/libtomcrypt/distinfo:1.5    Wed Nov  4 01:17:50 2015
+++ pkgsrc/security/libtomcrypt/distinfo        Sat Jun  3 18:03:48 2017
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.5 2015/11/04 01:17:50 agc Exp $
+$NetBSD: distinfo,v 1.5.12.1 2017/06/03 18:03:48 bsiegert Exp $
 
 SHA1 (crypt-1.17.tar.bz2) = 9c746822c84e4276e432b64964f94d1d5ddd13ad
 RMD160 (crypt-1.17.tar.bz2) = 742d72d82fea2e6a9865d8c682c10cbaba69ea2f
@@ -8,3 +8,4 @@ SHA1 (patch-aa) = a2385cf0543a19b1555d43
 SHA1 (patch-ab) = c0eb1522dd02c2811deebfa353433e81e71a8928
 SHA1 (patch-ac) = 871a713512b20199b502876d2523e8bf619c5e85
 SHA1 (patch-src_headers_tomcrypt__macros.h) = 4aa1e0773a11c32fca83e7de82e12d44fdbb8202
+SHA1 (patch-src_pk_rsa_rsa__verify__hash.c) = 0bc2467fa3fc0a372baafbfea4c7b328422f8adb

Added files:

Index: pkgsrc/security/libtomcrypt/patches/patch-src_pk_rsa_rsa__verify__hash.c
diff -u /dev/null pkgsrc/security/libtomcrypt/patches/patch-src_pk_rsa_rsa__verify__hash.c:1.1.2.2
--- /dev/null   Sat Jun  3 18:03:48 2017
+++ pkgsrc/security/libtomcrypt/patches/patch-src_pk_rsa_rsa__verify__hash.c    Sat Jun  3 18:03:48 2017
@@ -0,0 +1,33 @@
+$NetBSD: patch-src_pk_rsa_rsa__verify__hash.c,v 1.1.2.2 2017/06/03 18:03:48 bsiegert Exp $
+
+Fix for CVE-2016-6129.  
+
+Source: https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd09
+
+--- src/pk/rsa/rsa_verify_hash.c.orig  2007-05-12 07:46:25.000000000 -0700
++++ src/pk/rsa/rsa_verify_hash.c       2017-05-16 13:42:46.762259864 -0700
+@@ -96,7 +96,7 @@ int rsa_verify_hash_ex(const unsigned ch
+   } else {
+     /* LTC_PKCS #1 v1.5 decode it */
+     unsigned char *out;
+-    unsigned long outlen, loid[16];
++    unsigned long outlen, loid[16], reallen;
+     int           decoded;
+     ltc_asn1_list digestinfo[2], siginfo[2];
+ 
+@@ -138,8 +138,14 @@ int rsa_verify_hash_ex(const unsigned ch
+        goto bail_2;
+     }
+ 
++    if ((err = der_length_sequence(siginfo, 2, &reallen)) != CRYPT_OK) {
++       XFREE(out);
++       goto bail_2;
++    }
++
+     /* test OID */
+-    if ((digestinfo[0].size == hash_descriptor[hash_idx].OIDlen) &&
++    if ((reallen == outlen) &&
++        (digestinfo[0].size == hash_descriptor[hash_idx].OIDlen) &&
+         (XMEMCMP(digestinfo[0].data, hash_descriptor[hash_idx].OID, sizeof(unsigned long) * hash_descriptor[hash_idx].OIDlen) == 0) &&
+         (siginfo[1].size == hashlen) &&
+         (XMEMCMP(siginfo[1].data, hash, hashlen) == 0)) {



Home | Main Index | Thread Index | Old Index