ports/158674: [PATCH] security/gnupg fix gpg2 Assertion failed: (data), function mpi_from_sexp, file pkglue.c, line 41.

Mark Atkinson atkin901 at gmail.com
Tue Jul 5 20:10:11 UTC 2011


>Number:         158674
>Category:       ports
>Synopsis:       [PATCH] security/gnupg fix gpg2 Assertion failed: (data), function mpi_from_sexp, file pkglue.c, line 41.
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Tue Jul 05 20:10:10 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Mark Atkinson
>Release:        9.0-current
>Organization:
>Environment:
FreeBSD moby 9.0-CURRENT FreeBSD 9.0-CURRENT #4 r223681: Wed Jun 29 12:50:00 PDT 2011
>Description:
If you try to sign something in the recent gnupg 2.0.17 w/libcrypt 5.0 you will receive the following error:

enigmail> /usr/local/bin/gpg2 --charset utf8 --batch --no-tty --status-fd 2 --comment Using GnuPG with Mozilla - http://enigmail.mozdev.org/ -t --clearsign -u <atkin901 at gmail.com> --use-agent
Warning: using insecure memory!
Assertion failed: (data), function mpi_from_sexp, file pkglue.c, line 41.

This is first described here:

http://www.gossamer-threads.com/lists/gnupg/gcrypt/55063

and the appropriate patch is found here:

http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=blobdiff_plain;f=g10/pkglue.c;h=5c47511f7236cbde17a2a983bc597950be830475;hp=cbfe21ea89f4088033e660c5210178a535fb86c9;hb=13290b0e0fcf3a493e4848b29329d56b69bc4dd9;hpb=af497d52c3c88d1cdbedf1c7c2ce2f21f2bc9ad4


>How-To-Repeat:
Attempt to sign with gnupg 2.0.17 w/libcrypt 5.0
>Fix:
Apply the attached patch recompile and re-install.

Patch attached with submission follows:

diff --git a/g10/pkglue.c b/g10/pkglue.c
index cbfe21e..5c47511 100644
--- a/g10/pkglue.c
+++ b/g10/pkglue.c
@@ -34,10 +34,10 @@ mpi_from_sexp (gcry_sexp_t sexp, const char * item)
 {
   gcry_sexp_t list;
   gcry_mpi_t data;
-  
+
   list = gcry_sexp_find_token (sexp, item, 0);
   assert (list);
-  data = gcry_sexp_nth_mpi (list, 1, 0);
+  data = gcry_sexp_nth_mpi (list, 1, GCRYMPI_FMT_USG);
   assert (data);
   gcry_sexp_release (list);
   return data;
@@ -293,7 +293,7 @@ pk_decrypt (int algo, gcry_mpi_t * result, gcry_mpi_t * data,
   if (rc)
     return rc;
 
-  *result = gcry_sexp_nth_mpi (s_plain, 0, 0);
+  *result = gcry_sexp_nth_mpi (s_plain, 0, GCRYMPI_FMT_USG);
   gcry_sexp_release (s_plain);
   if (!*result)
     return -1;			/* oops */


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list