Linux Security
    Linux Security
    Linux Security

    Debian: DSA-2076-1: New gnupg2 packages fix potential code execution

    Date 27 Jul 2010
    282
    Posted By LinuxSecurity Advisories
    It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2076-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                           Florian Weimer
    July 27, 2010                         https://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : gnupg2
    Vulnerability  : use-after-free
    Problem type   : local (remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2010-2547
    Debian Bug     : 590122
    
    It was discovered that GnuPG 2 uses a freed pointer when verify a
    signature or importing a certificate with many Subject Alternate Names,
    potentially leading to arbitrary code execution.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 2.0.9-3.1+lenny1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version  2.0.14-2.
    
    GnuPG 1 (in the gnupg package) is not affected by this problem.
    
    We recommend that you upgrade your gnupg2 packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.dsc
        Size/MD5 checksum:     1682 405e9811b153ad4251835255e79e50e7
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.diff.gz
        Size/MD5 checksum:    40250 48d30d7a03a411929020196f4707e366
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9.orig.tar.gz
        Size/MD5 checksum:  5198703 3b6b1742509f396d51528e0cd4c76a13
    
    alpha architecture (DEC Alpha)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:   506092 20ddf3657383e5a1c128d7a6bbdb0e74
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:   345320 b1f3ca05b21ef10e8d57ebcee43a1a04
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:  2257726 2fd9ac262c0222a567c6ec26acd9b848
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:  2169660 1228c3ab918511ead561ec5331fbfae8
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:   316116 593be53060752c8873c7ffc4ce26ad92
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:   462744 f864f696b260080dbee107eff516717b
    
    arm architecture (ARM)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:   409934 a67874ca01827d29630dc16974b0c934
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:   279084 6c2417d8ff637d6ddbfbca69ce5a9332
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:  2083314 a8ee45ea904529b71e990f4d98d6fb05
    
    armel architecture (ARM EABI)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:   413846 d9773981d0b7a17842caf953625af0eb
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:  2092526 aae6bba65caad81c1aa62cf2315d847a
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:   281204 d3e5b416ca794e665bc107fd2e3981d0
    
    hppa architecture (HP PA RISC)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:   322572 461a593f1fc8f937072b8a6436c6c375
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:  2189366 ef71be75e3cc74735f9df4e8a9f4185c
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:   467836 2db47e0e38ea653db55cb3a7e67c221f
    
    i386 architecture (Intel ia32)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:   421382 9214c8c956347f5535f8284743ab4a56
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:  2111258 216b70c4252703d2b339e83f49fa48b9
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:   285638 90d912dabbeb8959e524ac3fe51b62af
    
    ia64 architecture (Intel ia64)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:  2545468 e32e42f67b85850c16b1d9467f83609e
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:   660374 c3d4f14c6f4a6dfe1a60baf549ff367a
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:   444926 3cfeb45a841e64267e391a9f59bb8c68
    
    mips architecture (MIPS (Big Endian))
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:   310928 a937b6b9643afcdc27a49877ab8ce03f
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:  2170292 4ecbf964d264bf5a81fc5cc1f8d4e7e1
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:   452494 f4aa041b82ce04f44ea3d48e7c9eea90
    
    mipsel architecture (MIPS (Little Endian))
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:  2156394 86a2f0a81e5c1307a79467c697994b10
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:   452910 bc88ae07b4f773c2e045959bdcdb088e
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:   310454 54f0e518e34b13207c67d08d244841c3
    
    powerpc architecture (PowerPC)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:  2181760 94eae71a050c44e50612467ee49cd0ff
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:   321404 5212acf39277399af97165d99e5943a4
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:   461700 54253f7d1dc99469d6b4679eaabb1e9a
    
    s390 architecture (IBM S/390)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:   322328 d0d83de5cacfa74ee3bc90a4de1f52b7
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:  2183640 c05ab771542dd76f00ba79e2e4a8a195
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:   464600 3142165f77991f60305d555ae7a2845c
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:   280932 fe9900d6e347c6e4aa307d0d4d52cee1
      https://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:  2100032 0e3d68f24cb12da51f37e8166606595b
      https://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:   412538 6f3332ffd017f2787c6427a9700a2928
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and https://packages.debian.org/
    

    Advisories

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"10","type":"x","order":"1","pct":32.26,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":19.35,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":48.39,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.