Package: gnupg Version: 1.4.3-1 Severity: serious Tags: security patch -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
CVE-2006-3082: "parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length, which could lead to an integer overflow, as demonstrated using the --no-armor option." Test case: perl -e 'print "\xcd\xff\xff\xff\xff\xfe"'| gpg --no-armor The test case will reproducibly crash gnupg in both sid and sarge. There is a patch [1] in the GnuPG CVS that purports to fix the issue; I have not yet tested to see if it does (or even if it applies cleanly). Please mention the CVE in your changelog. Thanks, Alec [1] http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/parse-packet.c?rev=4157&r1=4141&r2=4157&diff_format=u - -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/dash Kernel: Linux 2.6.16-alec-laptop Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Versions of packages gnupg depends on: ii libbz2-1.0 1.0.3-2 high-quality block-sorting file co ii libc6 2.3.6-15 GNU C Library: Shared libraries ii libldap2 2.1.30-13+b1 OpenLDAP libraries ii libreadline5 5.1-7 GNU readline and history libraries ii libusb-0.1-4 2:0.1.12-2 userspace USB programming library ii makedev 2.3.1-81 creates device files in /dev ii zlib1g 1:1.2.3-12 compression library - runtime gnupg recommends no packages. - -- no debconf information -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (GNU/Linux) iD8DBQFEmylTAud/2YgchcQRAkR7AKCJKnxmQ/UIIJC5M/GAAki0164CawCfYnVo +ByxhPRbhf9tg1DZYBd/FpU= =KgL5 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]