Debian: DSA-2076-1: New gnupg2 packages fix potential code execution

    Date27 Jul 2010
    CategoryDebian
    81
    Posted ByLinuxSecurity Advisories
    It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2076-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Florian Weimer
    July 27, 2010                         http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : gnupg2
    Vulnerability  : use-after-free
    Problem type   : local (remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2010-2547
    Debian Bug     : 590122
    
    It was discovered that GnuPG 2 uses a freed pointer when verify a
    signature or importing a certificate with many Subject Alternate Names,
    potentially leading to arbitrary code execution.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 2.0.9-3.1+lenny1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version  2.0.14-2.
    
    GnuPG 1 (in the gnupg package) is not affected by this problem.
    
    We recommend that you upgrade your gnupg2 packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.dsc
        Size/MD5 checksum:     1682 405e9811b153ad4251835255e79e50e7
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.diff.gz
        Size/MD5 checksum:    40250 48d30d7a03a411929020196f4707e366
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9.orig.tar.gz
        Size/MD5 checksum:  5198703 3b6b1742509f396d51528e0cd4c76a13
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:   506092 20ddf3657383e5a1c128d7a6bbdb0e74
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:   345320 b1f3ca05b21ef10e8d57ebcee43a1a04
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_alpha.deb
        Size/MD5 checksum:  2257726 2fd9ac262c0222a567c6ec26acd9b848
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:  2169660 1228c3ab918511ead561ec5331fbfae8
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:   316116 593be53060752c8873c7ffc4ce26ad92
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_amd64.deb
        Size/MD5 checksum:   462744 f864f696b260080dbee107eff516717b
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:   409934 a67874ca01827d29630dc16974b0c934
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:   279084 6c2417d8ff637d6ddbfbca69ce5a9332
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_arm.deb
        Size/MD5 checksum:  2083314 a8ee45ea904529b71e990f4d98d6fb05
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:   413846 d9773981d0b7a17842caf953625af0eb
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:  2092526 aae6bba65caad81c1aa62cf2315d847a
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_armel.deb
        Size/MD5 checksum:   281204 d3e5b416ca794e665bc107fd2e3981d0
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:   322572 461a593f1fc8f937072b8a6436c6c375
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:  2189366 ef71be75e3cc74735f9df4e8a9f4185c
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_hppa.deb
        Size/MD5 checksum:   467836 2db47e0e38ea653db55cb3a7e67c221f
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:   421382 9214c8c956347f5535f8284743ab4a56
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:  2111258 216b70c4252703d2b339e83f49fa48b9
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_i386.deb
        Size/MD5 checksum:   285638 90d912dabbeb8959e524ac3fe51b62af
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:  2545468 e32e42f67b85850c16b1d9467f83609e
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:   660374 c3d4f14c6f4a6dfe1a60baf549ff367a
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_ia64.deb
        Size/MD5 checksum:   444926 3cfeb45a841e64267e391a9f59bb8c68
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:   310928 a937b6b9643afcdc27a49877ab8ce03f
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:  2170292 4ecbf964d264bf5a81fc5cc1f8d4e7e1
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mips.deb
        Size/MD5 checksum:   452494 f4aa041b82ce04f44ea3d48e7c9eea90
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:  2156394 86a2f0a81e5c1307a79467c697994b10
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:   452910 bc88ae07b4f773c2e045959bdcdb088e
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mipsel.deb
        Size/MD5 checksum:   310454 54f0e518e34b13207c67d08d244841c3
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:  2181760 94eae71a050c44e50612467ee49cd0ff
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:   321404 5212acf39277399af97165d99e5943a4
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_powerpc.deb
        Size/MD5 checksum:   461700 54253f7d1dc99469d6b4679eaabb1e9a
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:   322328 d0d83de5cacfa74ee3bc90a4de1f52b7
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:  2183640 c05ab771542dd76f00ba79e2e4a8a195
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_s390.deb
        Size/MD5 checksum:   464600 3142165f77991f60305d555ae7a2845c
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:   280932 fe9900d6e347c6e4aa307d0d4d52cee1
      http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:  2100032 0e3d68f24cb12da51f37e8166606595b
      http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_sparc.deb
        Size/MD5 checksum:   412538 6f3332ffd017f2787c6427a9700a2928
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.