Univention Bugzilla – Full Text Bug Listing |
Summary: | gnupg2 Denial of service (3.2) | ||
---|---|---|---|
Product: | UCS | Reporter: | Moritz Muehlenhoff <jmm> |
Component: | Security updates | Assignee: | Arvid Requate <requate> |
Status: | CLOSED FIXED | QA Contact: | Daniel Tröder <troeder> |
Severity: | normal | ||
Priority: | P3 | CC: | gohmann, requate |
Version: | UCS 3.2 | ||
Target Milestone: | UCS 3.2-8-errata | ||
Hardware: | Other | ||
OS: | Linux | ||
What kind of report is it?: | --- | What type of bug is this?: | --- |
Who will be affected by this bug?: | --- | How will those affected feel about the bug?: | --- |
User Pain: | Enterprise Customer affected?: | ||
School Customer affected?: | ISV affected?: | ||
Waiting Support: | Flags outvoted (downgraded) after PO Review: | ||
Ticket number: | Bug group (optional): | ||
Max CVSS v3 score: |
Description
Moritz Muehlenhoff
2014-06-24 19:30:52 CEST
CVE-2015-1606: use after free when using non-standard keyring CVE-2015-1607: memcpy with overlapping ranges when using non-standard keyring CVE-2015-1606 and CVE-2015-1607 have been classified as "Minor issue" in Debian. 2.0.14-2+squeeze3 imported and built with fixed buildsystem version increment Advisory: gnupg2.yaml OK: advisory OK: manual functional test: # aptitude install pinentry-curses # aptitude remove pinentry-gtk2 # gpg-agent --daemon → GPG_AGENT_INFO=/tmp/gpg-g8SfkX/S.gpg-agent:18728:1; export GPG_AGENT_INFO; # gpg --gen-key # cat /etc/fstab | gpg2 --detach-sign --local-user test2@univention.de > fstab.sig2 # gpg --verify fstab.sig2 /etc/fstab → gpg: Korrekte Unterschrift von "Uni Test 2 <test2@univention.de>" # test "$(sha256sum /etc/fstab | cut -f 1 -d ' ')" = "$(cat /etc/fstab | gpg --encrypt --recipient test2@univention.de | gpg --decrypt - | sha256sum | cut -f 1 -d ' ')" && echo OK → OK |