diff options
author | Werner Koch <[email protected]> | 2012-12-20 08:43:41 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2012-12-20 08:43:41 +0000 |
commit | f795a0d59e197455f8723c300eebf59e09853efa (patch) | |
tree | a60c4ac164113e8a83f72795b61d1bc76cd05dc6 | |
parent | Issue 1447: Pass proper Host header and SNI when SRV is used with curl. (diff) | |
download | gnupg-f795a0d59e197455f8723c300eebf59e09853efa.tar.gz gnupg-f795a0d59e197455f8723c300eebf59e09853efa.zip |
Import only packets which are allowed in a keyblock.
* g10/import.c (valid_keyblock_packet): New.
(read_block): Store only valid packets.
--
A corrupted key, which for example included a mangled public key
encrypted packet, used to corrupt the keyring. This change skips all
packets which are not allowed in a keyblock.
GnuPG-bug-id: 1455
-rw-r--r-- | g10/import.c | 23 |
1 files changed, 22 insertions, 1 deletions
diff --git a/g10/import.c b/g10/import.c index 21ada4197..90fc2d678 100644 --- a/g10/import.c +++ b/g10/import.c @@ -343,6 +343,27 @@ import_print_stats (void *hd) } +/* Return true if PKTTYPE is valid in a keyblock. */ +static int +valid_keyblock_packet (int pkttype) +{ + switch (pkttype) + { + case PKT_PUBLIC_KEY: + case PKT_PUBLIC_SUBKEY: + case PKT_SECRET_KEY: + case PKT_SECRET_SUBKEY: + case PKT_SIGNATURE: + case PKT_USER_ID: + case PKT_ATTRIBUTE: + case PKT_RING_TRUST: + return 1; + default: + return 0; + } +} + + /**************** * Read the next keyblock from stream A. * PENDING_PKT should be initialzed to NULL @@ -420,7 +441,7 @@ read_block( IOBUF a, PACKET **pending_pkt, KBNODE *ret_root ) } in_cert = 1; default: - if( in_cert ) { + if (in_cert && valid_keyblock_packet (pkt->pkttype)) { if( !root ) root = new_kbnode( pkt ); else |