]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core-contrib.git/commitdiff
gnutils: Security fix CVE-2016-7444
authorArmin Kuster <akuster808@gmail.com>
Mon, 3 Oct 2016 00:11:14 +0000 (17:11 -0700)
committerRobert Yang <liezhi.yang@windriver.com>
Tue, 6 Dec 2016 13:19:39 +0000 (05:19 -0800)
affects gnutls < 3.3.24

Signed-off-by: Armin Kuster <akuster808@gmail.com>
meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch [new file with mode: 0644]
meta/recipes-support/gnutls/gnutls_3.3.17.1.bb

diff --git a/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch b/meta/recipes-support/gnutls/gnutls/CVE-2016-7444.patch
new file mode 100644 (file)
index 0000000..2bb0626
--- /dev/null
@@ -0,0 +1,31 @@
+From 964632f37dfdfb914ebc5e49db4fa29af35b1de9 Mon Sep 17 00:00:00 2001
+From: Nikos Mavrogiannopoulos <nmav@gnutls.org>
+Date: Sat, 27 Aug 2016 17:00:22 +0200
+Subject: [PATCH] ocsp: corrected the comparison of the serial size in OCSP
+ response
+
+Previously the OCSP certificate check wouldn't verify the serial length
+and could succeed in cases it shouldn't.
+
+Reported by Stefan Buehler.
+
+Upstream-Status: Backport
+CVE: CVE-2016-7444
+Signed-off-by: Armin Kuster <akuster@mvista.com>
+
+---
+ lib/x509/ocsp.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+Index: gnutls-3.3.17.1/lib/x509/ocsp.c
+===================================================================
+--- gnutls-3.3.17.1.orig/lib/x509/ocsp.c
++++ gnutls-3.3.17.1/lib/x509/ocsp.c
+@@ -1257,6 +1257,7 @@ gnutls_ocsp_resp_check_crt(gnutls_ocsp_r
+               gnutls_assert();
+               goto cleanup;
+       }
++      cserial.size = t;
+       if (rserial.size != cserial.size
+           || memcmp(cserial.data, rserial.data, rserial.size) != 0) {
index 018579752116e6a504c34eaa9e4fa787c43dbb7d..99b205314e8b7a1eb72d6629554415bf6aea0fef 100644 (file)
@@ -3,6 +3,7 @@ require gnutls.inc
 SRC_URI += "file://correct_rpl_gettimeofday_signature.patch \
             file://configure.ac-fix-sed-command.patch \
             file://use-pkg-config-to-locate-zlib.patch \
+            file://CVE-2016-7444.patch \
            "
 SRC_URI[md5sum] = "8d01c7e7f2cbc5871fdca832d2260b6b"
 SRC_URI[sha256sum] = "b40f158030a92f450a07b20300a3996710ca19800848d9f6fd62493170c5bbb4"