On Sun, 2017-03-05 at 19:08 +0100, Andreas Metzler wrote: > I would like fix a number of minor issues in GnuTLS.
Apologies for the delay in getting back to you. Are all of the issues listed below already resolved in unstable? > Most of these (notably CVE-2017-533[4567]) are related to the PGP > support, security does not intend to issue a DSA: > > + 55_00_pkcs12-fixed-the-calculation-of-p_size.patch > Fixed issue in PKCS#12 password encoding, which truncated > passwords over 32-characters. Reported by Mario Klebsch. > + 55_01_gnutls_x509_ext_import_proxy-fix-issue-reading-the-p.patch > Fix double free in certificate information printing. If the PKIX > extension proxy was set with a policy language set but no policy > specified, that could lead to a double free. [GNUTLS-SA-2017-1] > CVE-2017-5334 > + 55_02_auth-rsa-eliminated-memory-leak-on-pkcs-1-formatting.patch > Addressed memory leak in server side error path (issue found using > oss-fuzz project) > + 55_03_opencdk-Fixes-to-prevent-undefined-behavior-found-wi.patch > 55_04_Do-not-infinite-loop-if-an-EOF-occurs-while-skipping.patch > 55_05_Attempt-to-fix-a-leak-in-OpenPGP-cert-parsing.patch > 55_06_Corrected-a-leak-in-OpenPGP-sub-packet-parsing.patch > 55_07_opencdk-read_attribute-added-more-precise-checks-whe.patch > 55_08_opencdk-cdk_pk_get_keyid-fix-stack-overflow.patch > 55_09_opencdk-added-error-checking-in-the-stream-reading-f.patch > 55_10_opencdk-improved-error-code-checking-in-the-stream-r.patch > 55_11_opencdk-read-packet.c-corrected-typo-in-type-cast.patch > Addressed memory leaks and an infinite loop in OpenPGP certificate > parsing. Fixes by Alex Gaynor. (issues found using oss-fuzz project) > Addressed invalid memory accesses in OpenPGP certificate parsing. > (issues found using oss-fuzz project) [GNUTLS-SA-2017-2] > CVE-2017-5335 / CVE-2017-5336 / CVE-2017-5337 > + 55_12_gnutls_pkcs11_obj_list_import_url2-Always-return-an-.patch > When returning success, but no elements, > gnutls_pkcs11_obj_list_import_url4, could have returned zero number of > elements with a pointer that was uninitialized. Ensure that an > initialized (i.e., null in that case), pointer is always returned. > + 55_13_cdk_pkt_read-enforce-packet-limits.patch Addressed integer > overflow resulting to invalid memory write in OpenPGP certificate > parsing. Issue found using oss-fuzz project: > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420 > [GNUTLS-SA-2017-3A] > + 55_14_opencdk-read_attribute-account-buffer-size.patch Addressed read > of 1 byte past the end of buffer in OpenPGP certificate parsing. Issue > found using oss-fuzz project: > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=391 > (This patch is from gnutls_3_5_x branch.) > + 55_15_opencdk-do-not-parse-any-secret-keys-in-packet-when-.patch > Addressed crashes in OpenPGP certificate parsing, related to private key > parser. No longer allow OpenPGP certificates (public keys) to contain > private key sub-packets. Issue found using oss-fuzz project: > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=354 > https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=360 > [GNUTLS-SA-2017-3B] Regards, Adam