Browse code

libtasn1 : Update to version 4.13 fix CVE-2018-6003.

Change-Id: I3b629aed478b27ff3919190420a583009475d600
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/4779
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Anish Swaminathan <anishs@vmware.com>

Xiaolin Li authored on 2018/02/14 02:24:47
Showing 2 changed files
1 1
deleted file mode 100644
... ...
@@ -1,42 +0,0 @@
1
-diff --git a/lib/parser_aux.c b/lib/parser_aux.c
2
-index 976ab38..786ea64 100644
3
-+++ b/lib/parser_aux.c
4
-@@ -955,7 +955,7 @@ _asn1_check_identifier (asn1_node node)
5
- 	  if (p2 == NULL)
6
- 	    {
7
- 	      if (p->value)
8
--		_asn1_strcpy (_asn1_identifierMissing, p->value);
9
-+		_asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p->value);
10
- 	      else
11
- 		_asn1_strcpy (_asn1_identifierMissing, "(null)");
12
- 	      return ASN1_IDENTIFIER_NOT_FOUND;
13
-@@ -968,9 +968,15 @@ _asn1_check_identifier (asn1_node node)
14
- 	  if (p2 && (type_field (p2->type) == ASN1_ETYPE_DEFAULT))
15
- 	    {
16
- 	      _asn1_str_cpy (name2, sizeof (name2), node->name);
17
--	      _asn1_str_cat (name2, sizeof (name2), ".");
18
--	      _asn1_str_cat (name2, sizeof (name2), (char *) p2->value);
19
--	      _asn1_strcpy (_asn1_identifierMissing, p2->value);
20
-+	      if (p2->value)
21
-+	        {
22
-+	          _asn1_str_cat (name2, sizeof (name2), ".");
23
-+	          _asn1_str_cat (name2, sizeof (name2), (char *) p2->value);
24
-+	          _asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p2->value);
25
-+	        }
26
-+	      else
27
-+		_asn1_strcpy (_asn1_identifierMissing, "(null)");
28
-+
29
- 	      p2 = asn1_find_node (node, name2);
30
- 	      if (!p2 || (type_field (p2->type) != ASN1_ETYPE_OBJECT_ID) ||
31
- 		  !(p2->type & CONST_ASSIGN))
32
-@@ -990,7 +996,8 @@ _asn1_check_identifier (asn1_node node)
33
- 		  _asn1_str_cpy (name2, sizeof (name2), node->name);
34
- 		  _asn1_str_cat (name2, sizeof (name2), ".");
35
- 		  _asn1_str_cat (name2, sizeof (name2), (char *) p2->value);
36
--		  _asn1_strcpy (_asn1_identifierMissing, p2->value);
37
-+		  _asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p2->value);
38
-+
39
- 		  p2 = asn1_find_node (node, name2);
40
- 		  if (!p2 || (type_field (p2->type) != ASN1_ETYPE_OBJECT_ID)
41
- 		      || !(p2->type & CONST_ASSIGN))
... ...
@@ -1,15 +1,14 @@
1 1
 Summary:        ASN.1 library
2 2
 Name:           libtasn1
3
-Version:        4.12
3
+Version:        4.13
4 4
 Release:        1%{?dist}
5 5
 License:        GPLv3+ and LGPLv2+
6 6
 URL:            http://www.gnu.org/software/libtasn1/
7 7
 Source0:        http://ftp.gnu.org/gnu/libtasn1/%{name}-%{version}.tar.gz
8
-%define sha1    libtasn1=f9a05b3b8acf319d89f07267407c03b184c4e3b0
8
+%define sha1    libtasn1=a84afb4cd8187c1fa5901c6bc1cf1486eea66635
9 9
 Group:          System Environment/Libraries
10 10
 Vendor:         VMware, Inc.
11 11
 Distribution:   Photon
12
-Patch0:         libtasn1-CVE-2017-10790.patch
13 12
 
14 13
 %description
15 14
 Libtasn1 library provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, 
... ...
@@ -26,7 +25,6 @@ developing applications that use libtasn1.
26 26
 
27 27
 %prep
28 28
 %setup -q
29
-%patch0 -p1
30 29
 
31 30
 %build
32 31
 ./configure \
... ...
@@ -53,6 +51,8 @@ make -k check |& tee %{_specdir}/%{name}-check-log || %{nocheck}
53 53
 %{_libdir}/pkgconfig/*.pc
54 54
 %{_libdir}/*.a
55 55
 %changelog
56
+*   Mon Feb 12 2018 Xiaolin Li <xiaolinl@vmware.com> 4.13-1
57
+-   Update to version 4.13 fix CVE-2018-6003.
56 58
 *   Tue Oct 17 2017 Xiaolin Li <xiaolinl@vmware.com> 4.12-1
57 59
 -   Update to 4.12 and apply patch for CVE-2017-10790
58 60
 *   Wed Nov 30 2016 Dheeraj Shetty <dheerajs@vmware.com> 4.7-3