Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#20433 - [gnupg2] GPGSM certificate parsing use-after-free vulnerability
Attached to Project:
Arch Linux
Opened by Roman Kyrylych (Romashka) - Tuesday, 10 August 2010, 21:15 GMT
Last edited by Tobias Powalowski (tpowa) - Wednesday, 11 August 2010, 15:50 GMT
Opened by Roman Kyrylych (Romashka) - Tuesday, 10 August 2010, 21:15 GMT
Last edited by Tobias Powalowski (tpowa) - Wednesday, 11 August 2010, 15:50 GMT
|
DetailsDescription:
A vulnerability has been reported in GnuPG, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to a use-after-free error within the GPGSM tool when processing certificates having more than 98 Subject Alternate Names. This can be exploited to cause a crash and potentially execute arbitrary code by e.g. tricking a user into processing a specially crafted certificate using the GPGSM tool. The vulnerability is reported in version 2.0.16. Other GnuPG 2.x versions may also be affected. Original advisory with a fix: http://lists.gnupg.org/pipermail/gnupg-announce/2010q3/000302.html |
This task depends upon
Closed by Tobias Powalowski (tpowa)
Wednesday, 11 August 2010, 15:50 GMT
Reason for closing: Fixed
Additional comments about closing: 2.0.16-2
Wednesday, 11 August 2010, 15:50 GMT
Reason for closing: Fixed
Additional comments about closing: 2.0.16-2