FS#20433 - [gnupg2] GPGSM certificate parsing use-after-free vulnerability

Attached to Project: Arch Linux
Opened by Roman Kyrylych (Romashka) - Tuesday, 10 August 2010, 21:15 GMT
Last edited by Tobias Powalowski (tpowa) - Wednesday, 11 August 2010, 15:50 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Tobias Powalowski (tpowa)
Architecture All
Severity Medium
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:
A vulnerability has been reported in GnuPG, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused due to a use-after-free error within the GPGSM tool when processing certificates having more than 98 Subject Alternate Names. This can be exploited to cause a crash and potentially execute arbitrary code by e.g. tricking a user into processing a specially crafted certificate using the GPGSM tool.
The vulnerability is reported in version 2.0.16. Other GnuPG 2.x versions may also be affected.

Original advisory with a fix:
http://lists.gnupg.org/pipermail/gnupg-announce/2010q3/000302.html
This task depends upon

Closed by  Tobias Powalowski (tpowa)
Wednesday, 11 August 2010, 15:50 GMT
Reason for closing:  Fixed
Additional comments about closing:  2.0.16-2

Loading...