Bugzilla – Bug 844175
VUL-0: CVE-2013-4402: GnuPG 2.0.22 and 1.4.15 fix denial of service through infinite recursion in the compressed packet parser CVE-2013-4402
Last modified: 2015-08-12 12:32:21 UTC
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Firefox/24.0 From http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000333.html What's New in 2.0.22 ==================== * Fixed possible infinite recursion in the compressed packet parser. [CVE-2013-4402] * Improved support for some card readers. * Prepared building with the forthcoming Libgcrypt 1.6. * Protect against rogue keyservers sending secret keys. Also GnuPG 1.4.15 contains the fix. Reproducible: Always Steps to Reproduce: 1. 2. 3.
SR to Base:System: https://build.opensuse.org/request/show/202365 git.gnupg.org is down atm, cannot get the single patch for a maintenance update.
This is an autogenerated message for OBS integration: This bug (844175) was mentioned in https://build.opensuse.org/request/show/202374 Factory / gpg2
remote denial of service
The SWAMPID for this issue is 54672. This issue was rated as moderate. Please submit fixed packages until 2013-10-21. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
thanks for the heads up! :)
Created attachment 561577 [details] patch based on upstream commit on 1.4.x branch From http://lists.gnupg.org/pipermail/gnupg-commits/2013-October/010131.html
Created attachment 561578 [details] patch based on upstream commit on 2.0.x branch From http://lists.gnupg.org/pipermail/gnupg-commits/2013-October/010132.html
(In reply to comment #8) > Created an attachment (id=561578) [details] > patch based on upstream commit on 2.0.x branch > > From http://lists.gnupg.org/pipermail/gnupg-commits/2013-October/010132.html Review maintenance request for openSUSE 12.2 and 12.3 using this patch: https://build.opensuse.org/request/show/202386
Thanks for the patches, Andreas! Fixed packages for SLE have been submitted.
This is an autogenerated message for OBS integration: This bug (844175) was mentioned in https://build.opensuse.org/request/show/202893 Evergreen:11.2:Test / gpg2
openSUSE-SU-2013:1546-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 844175 CVE References: CVE-2013-4402 Sources used: openSUSE 12.3 (src): gpg2-2.0.19-5.12.1 openSUSE 12.2 (src): gpg2-2.0.19-2.17.1
openSUSE-SU-2013:1552-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 844175 CVE References: CVE-2013-4402 Sources used: openSUSE 11.4 (src): gpg2-2.0.19-18.1
This is an autogenerated message for OBS integration: This bug (844175) was mentioned in https://build.opensuse.org/request/show/203987 Evergreen:11.2 / gpg2
released
Update released for: gpg Products: SUSE-CORE 9-SP3-TERADATA (x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
Update released for: gpg2, gpg2-debuginfo Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP3-LTSS (i386, s390x, x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP4-LTSS (i386, s390x, x86_64)
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP1 (i386, s390x, x86_64) SLE-SERVER 11-SP1-LTSS (i386, s390x, x86_64)
SUSE-SU-2014:0750-1: An update that contains security fixes can now be installed. Category: security (moderate) Bug References: 778723,780943,798465,808958,840510,844175 CVE References: Sources used: SUSE Linux Enterprise Server 11 SP1 LTSS (src): gpg2-2.0.9-25.33.37.6