From be1a8efbc36c2c23d0b7ff26191fb36d02dc4ebf224959e3e732e1e5d017e545 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?V=C3=ADt=C4=9Bzslav=20=C4=8C=C3=AD=C5=BEek?= Date: Sat, 5 Oct 2013 15:00:23 +0000 Subject: [PATCH] Accepting request 202365 from home:AndreasStieger:branches:Base:System update to 2.0.22 [bnc#844175] [CVE-2013-4402] OBS-URL: https://build.opensuse.org/request/show/202365 OBS-URL: https://build.opensuse.org/package/show/Base:System/gpg2?expand=0&rev=65 --- gnupg-2.0.21.tar.bz2 | 3 -- gnupg-2.0.21.tar.bz2.sig | Bin 287 -> 0 bytes gnupg-2.0.22.tar.bz2 | 3 ++ gnupg-2.0.22.tar.bz2.sig | Bin 0 -> 287 bytes gnupg-2.0.9-RSA_ES.patch | 30 ++++++++++---------- gpg2-CVE-2013-4351.patch | 60 --------------------------------------- gpg2.changes | 11 +++++++ gpg2.spec | 4 +-- 8 files changed, 30 insertions(+), 81 deletions(-) delete mode 100644 gnupg-2.0.21.tar.bz2 delete mode 100644 gnupg-2.0.21.tar.bz2.sig create mode 100644 gnupg-2.0.22.tar.bz2 create mode 100644 gnupg-2.0.22.tar.bz2.sig delete mode 100644 gpg2-CVE-2013-4351.patch diff --git a/gnupg-2.0.21.tar.bz2 b/gnupg-2.0.21.tar.bz2 deleted file mode 100644 index d5090d0..0000000 --- a/gnupg-2.0.21.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:00df8902c7cef4d2440d36ca2a45985853eb36c34a4163bc995c3578030eeef5 -size 4300604 diff --git a/gnupg-2.0.21.tar.bz2.sig b/gnupg-2.0.21.tar.bz2.sig deleted file mode 100644 index 4776f67262f29250fd8c2bc821bfdccdeb2bb7b936bad5691424a4824eb7e102..0000000000000000000000000000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 287 zcmV+)0pR|L0UQJX0SEvF1p-nM4TS&-2@oWkInqxhXGayHgmoi>_AS zY;Mh~+ gnupg.org> -Date: Fri Mar 15 15:46:03 2013 +0100 - - gpg: Distinguish between missing and cleared key flags. - - * include/cipher.h (PUBKEY_USAGE_NONE): New. - * g10/getkey.c (parse_key_usage): Set new flag. - -- - - We do not want to use the default capabilities (derived from the - algorithm) if any key flags are given in a signature. Thus if key - flags are used in any way, the default key capabilities are never - used. - - This allows to create a key with key flags set to all zero so it can't - be used. This better reflects common sense. - - Modified g10/getkey.c -Index: gnupg-2.0.9/g10/getkey.c -=================================================================== ---- gnupg-2.0.9.orig/g10/getkey.c 2013-09-16 16:51:02.752624501 +0200 -+++ gnupg-2.0.9/g10/getkey.c 2013-09-16 16:54:20.955952692 +0200 -@@ -1457,13 +1457,19 @@ parse_key_usage(PKT_signature *sig) - - if(flags) - key_usage |= PUBKEY_USAGE_UNKNOWN; -+ -+ if (!key_usage) -+ key_usage |= PUBKEY_USAGE_NONE; - } -+ else if (p) /* Key flags of length zero. */ -+ key_usage |= PUBKEY_USAGE_NONE; - - /* We set PUBKEY_USAGE_UNKNOWN to indicate that this key has a - capability that we do not handle. This serves to distinguish - between a zero key usage which we handle as the default - capabilities for that algorithm, and a usage that we do not -- handle. */ -+ handle. Likewise we use PUBKEY_USAGE_NONE to indicate that -+ key_flags have been given but they do not specify any usage. */ - - return key_usage; - } -Index: gnupg-2.0.9/include/cipher.h -=================================================================== ---- gnupg-2.0.9.orig/include/cipher.h 2013-09-16 16:51:02.752624501 +0200 -+++ gnupg-2.0.9/include/cipher.h 2013-09-16 16:56:27.028429026 +0200 -@@ -62,6 +62,11 @@ - #define PUBKEY_USAGE_CERT GCRY_PK_USAGE_CERT /* Also good to certify keys. */ - #define PUBKEY_USAGE_AUTH GCRY_PK_USAGE_AUTH /* Good for authentication. */ - #define PUBKEY_USAGE_UNKNOWN GCRY_PK_USAGE_UNKN /* Unknown usage flag. */ -+#define PUBKEY_USAGE_NONE 256 /* No usage given. */ -+#if (GCRY_PK_USAGE_SIGN | GCRY_PK_USAGE_ENCR | GCRY_PK_USAGE_CERT \ -+ | GCRY_PK_USAGE_AUTH | GCRY_PK_USAGE_UNKN) >= 256 -+# error Please choose another value for PUBKEY_USAGE_NONE -+#endif - - #define DIGEST_ALGO_MD5 /* 1 */ GCRY_MD_MD5 - #define DIGEST_ALGO_SHA1 /* 2 */ GCRY_MD_SHA1 diff --git a/gpg2.changes b/gpg2.changes index 1545167..4b061f3 100644 --- a/gpg2.changes +++ b/gpg2.changes @@ -1,3 +1,14 @@ +------------------------------------------------------------------- +Sat Oct 5 11:44:42 UTC 2013 - andreas.stieger@gmx.de + +- update to 2.0.22 [bnc#844175] + * Fixed possible infinite recursion in the compressed packet + parser. [CVE-2013-4402] + * Improved support for some card readers. + * Prepared building with the forthcoming Libgcrypt 1.6. + * Protect against rogue keyservers sending secret keys. +- remove gpg2-CVE-2013-4351.patch, committed upstream + ------------------------------------------------------------------- Mon Sep 16 11:08:55 UTC 2013 - vcizek@suse.com diff --git a/gpg2.spec b/gpg2.spec index b44bf64..7361834 100644 --- a/gpg2.spec +++ b/gpg2.spec @@ -17,7 +17,7 @@ Name: gpg2 -Version: 2.0.21 +Version: 2.0.22 Release: 0 BuildRequires: automake >= 1.10 BuildRequires: expect @@ -64,7 +64,6 @@ Patch8: gnupg-set_umask_before_open_outfile.patch Patch9: gnupg-detect_FIPS_mode.patch # PATCH-FIX-OPENSUSE coolo@suse.de -- automake 1.13 already includes $SHELL Patch10: gnupg-2.0.20-automake113.diff -Patch11: gpg2-CVE-2013-4351.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build @@ -84,7 +83,6 @@ gpg-agent, and a keybox library. %patch8 -p1 %patch9 -p1 %patch10 -p1 -%patch11 -p1 %build autoreconf -fi