Univention Bugzilla – Bug 37841
gnupg: Multiple issues (4.0)
Last modified: 2015-03-25 16:39:56 CET
CVE-2015-1606: use after free when using non-standard keyring CVE-2015-1607: memcpy with overlapping ranges when using non-standard keyring
Side-channel attack on El-Gamal keys (CVE-2014-3591) Side-channel attack in the mpi_pow() function (CVE-2015-0837)
(In reply to Arvid Requate from comment #0) > CVE-2015-1607: memcpy with overlapping ranges when using non-standard keyring This won't be fixed in Debian stable; the patch is very intrusive and the impact of the security bug is marginal (only triggerable when importing malformed keyring data). As such, it won't be fixed in UCS either.
Tests (i386): OK Advisory: 2015-03-19-gnupg.yaml
OK: apt-cache policy gnupg # 1.4.12-7.66.201503191340 OK: aptitude install '?source-package(gnupg)?installed' # i386 #amd64 OK: zless /usr/share/doc/gnupg/changelog.Debian.gz OK: gpg --dearmor <debian/patches/CVE-2015-1606.patch >./FILE ; gpg --no-default-keyring --keyring ./FILE --export >/dev/null OLD: gpg: Segmentation fault caught ... exiting NEW: gpg: skipped packet of type 11 in keyring OK: CVE-2015-1606 CVE-2014-3591 CVE-2015-0837 OK: 2015-03-19-gnupg.yaml OK: errata-announce -V 2015-03-19-gnupg.yaml
<http://errata.univention.de/ucs/4.0/137.html>