Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in GnuPG
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in GnuPG
ID: USN-1987-1
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04
Datum: Mi, 9. Oktober 2013, 22:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402
Applikationen: The GNU Privacy Guard

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8120181575993857844==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="PfFHwwmAEH9DOq14lqTj3Qi46uxgRXFOx"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--PfFHwwmAEH9DOq14lqTj3Qi46uxgRXFOx
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1987-1
October 09, 2013

gnupg, gnupg2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in GnuPG.

Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- gnupg2: GNU privacy guard - a free PGP replacement

Details:

Daniel Kahn Gillmor discovered that GnuPG treated keys with empty usage
flags as being valid for all usages. (CVE-2013-4351)

Taylor R Campbell discovered that GnuPG incorrectly handled certain OpenPGP
messages. If a user or automated system were tricked into processing a
specially-crafted message, GnuPG could consume resources, resulting in a
denial of service. (CVE-2013-4402)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
gnupg 1.4.12-7ubuntu1.2
gnupg2 2.0.19-2ubuntu1.1

Ubuntu 12.10:
gnupg 1.4.11-3ubuntu4.3
gnupg2 2.0.17-2ubuntu3.2

Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.4
gnupg2 2.0.17-2ubuntu2.12.04.3

Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.4
gnupg2 2.0.14-1ubuntu1.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1987-1
CVE-2013-4351, CVE-2013-4402

Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.2
https://launchpad.net/ubuntu/+source/gnupg2/2.0.19-2ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.3
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu3.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.4
https://launchpad.net/ubuntu/+source/gnupg2/2.0.17-2ubuntu2.12.04.3
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.4
https://launchpad.net/ubuntu/+source/gnupg2/2.0.14-1ubuntu1.6



--PfFHwwmAEH9DOq14lqTj3Qi46uxgRXFOx
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=d7Ys
-----END PGP SIGNATURE-----

--PfFHwwmAEH9DOq14lqTj3Qi46uxgRXFOx--


--===============8120181575993857844==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8120181575993857844==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung