Debian Patches

Status for libksba/1.5.0-3+deb11u2

Patch Description Author Forwarded Bugs Origin Last update
0001-fix-win32-linker.patch fix mingw32 linker error without this patch, we get a problem cross-building for mingw32, where the linker script is not recognized.
.
This is a similar issue to the one the libgpg-error had in
https://lists.gnupg.org/pipermail/gnupg-devel/2016-February/030798.html
Daniel Kahn Gillmor <dkg@fifthhorseman.net> no 2016-02-14
10_Fix-a-possible-segv-in-case-of-an-unknown-CMS-object.patch [PATCH] Fix a possible segv in case of an unknown CMS object.
* src/cms.c (ksba_cms_get_enc_val): Fix strcmp.
--
Werner Koch <wk@gnupg.org> no 2020-12-21
20_Detect-a-possible-overflow-directly-in-the-TLV-parse.patch [PATCH] Detect a possible overflow directly in the TLV parser.
* src/ber-help.c (_ksba_ber_read_tl): Check for overflow of a commonly
used sum.
--

It is quite common to have checks like

if (ti.nhdr + ti.length >= DIM(tmpbuf))
return gpg_error (GPG_ERR_TOO_LARGE);

This patch detects possible integer overflows immmediately when
creating the TI object.
Werner Koch <wk@gnupg.org> no 2022-10-05
25-Fix-an-integer-overflow-in-the-CRL-signature-parser.patch [PATCH] Fix an integer overflow in the CRL signature parser.
* src/crl.c (parse_signature): N+N2 now checked for overflow.

* src/ocsp.c (parse_response_extensions): Do not accept too large
values.
(parse_single_extensions): Ditto.
--

The second patch is an extra safegourd not related to the reported
bug.
Werner Koch <wk@gnupg.org> no 2022-11-22

All known versions for source package 'libksba'

Links