1. 18 Jun, 2013 6 commits
  2. 16 Jun, 2013 2 commits
  3. 06 Jun, 2013 2 commits
  4. 04 Jun, 2013 3 commits
    • Dave Reisner's avatar
      pacman-key: Do not reinterpret keys from revoked keyrings · d080a469
      Dave Reisner authored and Allan McRae's avatar Allan McRae committed
      
      
      Given a revoked keyring containing only:
      
        BC1FBE4D2826A0B51E47ED62E2539214C6C11350
      
      We should only disable this specific keyid. This change enforces that the
      contents of the -revoked keyring file are full fingerprints which can uniquely
      identify a key.
      
      Before:
      
        # pacman-key --populate archlinux
        ==> Appending keys from archlinux.gpg...
        ==> Locally signing trusted keys in keyring...
          -> Locally signing key 0E8B644079F599DFC1DDC3973348882F6AC6A4C2...
          -> Locally signing key 684148BB25B49E986A4944C55184252D824B18E8...
          -> Locally signing key 44D4A033AC140143927397D47EFD567D4C7EA887...
          -> Locally signing key 27FFC4769E19F096D41D9265A04F9397CDFD6BB0...
          -> Locally signing key AB19265E5D7D20687D303246BA1DFB64FFF979E7...
        ==> Importing owner trust values...
        ==> Disabling revoked keys in keyring...
          -> Disabling key 1390420191...
          -> Disabling key E2539214C6C11350...
          -> Disabling key 8544EA82113502DE...
        ==> Updating trust database...
        gpg: next trustdb check due at 2014-01-22
      
      After:
      
        # pacman-key --populate archlinux
        ==> Appending keys from archlinux.gpg...
        ==> Locally signing trusted keys in keyring...
          -> Locally signing key 0E8B644079F599DFC1DDC3973348882F6AC6A4C2...
          -> Locally signing key 684148BB25B49E986A4944C55184252D824B18E8...
          -> Locally signing key 44D4A033AC140143927397D47EFD567D4C7EA887...
          -> Locally signing key 27FFC4769E19F096D41D9265A04F9397CDFD6BB0...
          -> Locally signing key AB19265E5D7D20687D303246BA1DFB64FFF979E7...
        ==> Importing owner trust values...
        ==> Disabling revoked keys in keyring...
          -> Disabling key BC1FBE4D2826A0B51E47ED62E2539214C6C11350...
        ==> Updating trust database...
        gpg: next trustdb check due at 2014-01-22
      
      Partially addresses FS#35478. This does nothing to confirm whether or not the
      key was successfully disabled -- a ridiculously simple request which appears to
      be far too difficult for gpg to manage.
      
      Signed-off-by: default avatarDave Reisner <dreisner@archlinux.org>
      Signed-off-by: Allan McRae's avatarAllan McRae <allan@archlinux.org>
      d080a469
    • Simon Gomizelj's avatar
      validate %FILEPATH% when parsing repo dbs · dd62fde5
      Simon Gomizelj authored and Allan McRae's avatar Allan McRae committed
      
      
      Currently we make no effort to validate the %FILENAME% field in the
      repo db. This allows for relative paths to be considered valid.
      
      A carefully crafted db entry with a malicious relative path,
      (e.g. `../../../../etc/passwd`) will cause pacman to to
      overwrite _any_ file on the target's machine.
      
      Add the following validation:
      
      - doesn't start with '.'
      - doesn't contain a '/'
      - won't overflow PATH_MAX
      
      Signed-off-by: default avatarSimon Gomizelj <simongmzlj@gmail.com>
      Signed-off-by: Allan McRae's avatarAllan McRae <allan@archlinux.org>
      dd62fde5
    • Allan McRae's avatar
      Restrict pkgname from starting with a dot. · fe794ccb
      Allan McRae authored
      
      
      Adding this restriction means we can filter any FILENAME entry from
      starting with a "/" or a ".".  Use the term "dot" as it is more
      computing relevant compared to "full stop" or "period" which vary
      depending on English locale.
      
      Signed-off-by: Allan McRae's avatarAllan McRae <allan@archlinux.org>
      fe794ccb
  5. 29 May, 2013 2 commits
  6. 19 May, 2013 1 commit
  7. 18 May, 2013 5 commits
  8. 07 May, 2013 4 commits
  9. 30 Apr, 2013 2 commits
  10. 28 Apr, 2013 1 commit
  11. 26 Apr, 2013 1 commit
  12. 24 Apr, 2013 1 commit
  13. 18 Apr, 2013 1 commit
  14. 11 Apr, 2013 6 commits
  15. 09 Apr, 2013 3 commits