diff --git a/backport-CVE-2022-34903.patch b/backport-CVE-2022-34903.patch new file mode 100644 index 0000000000000000000000000000000000000000..42fa16e8e1f893b5474ed88e67eb0d1cc9816b81 --- /dev/null +++ b/backport-CVE-2022-34903.patch @@ -0,0 +1,50 @@ +From 34c649b3601383cd11dbc76221747ec16fd68e1b Mon Sep 17 00:00:00 2001 +From: Werner Koch +Date: Tue, 14 Jun 2022 11:33:27 +0200 +Subject: [PATCH] g10: Fix garbled status messages in NOTATION_DATA + +* g10/cpr.c (write_status_text_and_buffer): Fix off-by-one +-- + +Depending on the escaping and line wrapping the computed remaining +buffer length could be wrong. Fixed by always using a break to +terminate the escape detection loop. Might have happened for all +status lines which may wrap. + +GnuPG-bug-id: T6027 +--- + g10/cpr.c | 13 ++++--------- + 1 file changed, 4 insertions(+), 9 deletions(-) + +diff --git a/g10/cpr.c b/g10/cpr.c +index 9bfdd3c34..fa8005d6f 100644 +--- a/g10/cpr.c ++++ b/g10/cpr.c +@@ -372,20 +372,15 @@ write_status_text_and_buffer (int no, const char *string, + } + first = 0; + } +- for (esc=0, s=buffer, n=len; n && !esc; s++, n--) ++ for (esc=0, s=buffer, n=len; n; s++, n--) + { + if (*s == '%' || *(const byte*)s <= lower_limit + || *(const byte*)s == 127 ) + esc = 1; + if (wrap && ++count > wrap) +- { +- dowrap=1; +- break; +- } +- } +- if (esc) +- { +- s--; n++; ++ dowrap=1; ++ if (esc || dowrap) ++ break; + } + if (s != buffer) + es_fwrite (buffer, s-buffer, 1, statusfp); +-- +2.27.0 + diff --git a/gnupg2.spec b/gnupg2.spec index cf848d93f98851a66878ad738d97b98f81e94f65..49d50590f87acca4a3290dd98404886ff276e7c6 100644 --- a/gnupg2.spec +++ b/gnupg2.spec @@ -1,6 +1,6 @@ Name: gnupg2 Version: 2.3.6 -Release: 2 +Release: 3 Summary: Utility for secure communication and data storage License: GPLv3+ @@ -17,6 +17,7 @@ Patch5: gnupg-2.2.18-gpg-allow-import-of-previously-known-keys-even-without-UI. Patch6: gnupg-2.2.18-tests-add-test-cases-for-import-without-uid.patch Patch7: gnupg-2.2.20-file-is-digest.patch Patch8: gnupg-2.2.21-coverity.patch +Patch9: backport-CVE-2022-34903.patch BuildRequires: gcc BuildRequires: zlib-devel, npth-devel, texinfo @@ -119,6 +120,9 @@ make check %changelog +* Mon Aug 15 2022 yixiangzhike - 2.3.6-3 +- fix CVE-2022-34903 + * Wed Jul 6 2022 yixiangzhike - 2.3.6-2 - cleanup unused patch files