-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/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=d7Ys
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1987-1
October 09, 2013
gnupg, gnupg2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in GnuPG.
Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- gnupg2: GNU privacy guard - a free PGP replacement
Details:
Daniel Kahn Gillmor discovered that GnuPG treated keys with empty usage
flags as being valid for all usages. (CVE-2013-4351)
Taylor R Campbell discovered that GnuPG incorrectly handled certain OpenPGP
messages. If a user or automated system were tricked into processing a
specially-crafted message, GnuPG could consume resources, resulting in a
denial of service. (CVE-2013-4402)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
gnupg 1.4.12-7ubuntu1.2
gnupg2 2.0.19-2ubuntu1.1
Ubuntu 12.10:
gnupg 1.4.11-3ubuntu4.3
gnupg2 2.0.17-2ubuntu3.2
Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.4
gnupg2 2.0.17-2ubuntu2.12.04.3
Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.4
gnupg2 2.0.14-1ubuntu1.6
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1987-1
CVE-2013-4351, CVE-2013-4402
Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.2
https://launchpad.net/ubuntu/+source/gnupg2/2.0.19-2ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.3
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu3.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.4
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu2.12.04.3
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.4
https://launchpad.net/ubuntu/+source/gnupg2/2.0.14-1ubuntu1.6
No comments:
Post a Comment