Debian: DSA-2601-1: gnupg, gnupg2 security update
Debian: DSA-2601-1: gnupg, gnupg2 security update
KB Sriram discovered that GnuPG, the GNU Privacy Guard did not sufficiently sanitise public keys on import, which could lead to memory and keyring corruption.
- ------------------------------------------------------------------------- Debian Security Advisory DSA-2601-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Thijs Kinkhorst January 06, 2013 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gnupg, gnupg2 Vulnerability : missing input sanitation Problem type : local (remote) Debian-specific: no CVE ID : CVE-2012-6085 Debian Bug : 697108 697251 KB Sriram discovered that GnuPG, the GNU Privacy Guard did not sufficiently sanitise public keys on import, which could lead to memory and keyring corruption. The problem affects both version 1, in the 'gnupg' package, and version two, in the 'gnupg2' package. For the stable distribution (squeeze), this problem has been fixed in version 1.4.10-4+squeeze1 of gnupg and version 2.0.19-2+squeeze1 of gnupg2. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 1.4.12-7 of gnupg and version 2.0.19-2 of gnupg2. We recommend that you upgrade your gnupg and/or gnupg2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.