Multiple GnuPG Memory Corruption Vulnerabilities
Release date:
Updated on:
Affected Systems:
GnuPG Gnupg2 2.0.26
Description:
Gnupg2 is a GNU encryption program.
Gnupg2 2.0.26 and earlier versions have multiple security vulnerabilities. Malicious users can exploit these vulnerabilities to execute arbitrary code. The "p12_build ()" function (sm/minip12.c) has a dual-release vulnerability, which can damage the memory. The "cmd_readkey ()" function (scd/command. c) The dual release vulnerability can damage the memory. The "ldapserver_parse_one ()" function (dirmngr/ldapserver. c) and "parse_keyserver_line ()" functions (sm/gpgsm. c) The dual release vulnerability can damage the memory.
<* Source: Joshua Rogers
Link: http://secunia.com/advisories/61939/
*>
Suggestion:
Vendor patch:
GnuPG
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.gnupg.org/
Joshua Rogers:
Https://bugs.debian.org/cgi-bin/bugreport.cgi? Bug = 773472
Https://bugs.debian.org/cgi-bin/bugreport.cgi? Bug = 773471
Https://bugs.debian.org/cgi-bin/bugreport.cgi? Bug = 773523
Https://bugs.debian.org/cgi-bin/bugreport.cgi? Bug = 773473
GnuPG GIT:
Http://git.gnupg.org/cgi-bin/gitweb.cgi? P = gnupg. git; a = commit; h = ed8383c618e124cfa708c9ee87563fcdf2f4649c
Http://git.gnupg.org/cgi-bin/gitweb.cgi? P = gnupg. git; a = commit; h = b0b3803e8c2959dd67ca96debc54b5c6464f0d41
Http://git.gnupg.org/cgi-bin/gitweb.cgi? P = gnupg. git; a = commit; h = abd5f6752d693b7f313c19604f0723ec4d39a6
This article permanently updates the link address: