Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 534110

Summary: <app-crypt/gnupg-2.0.26-r3: multiple vulnerabilities
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: alonbl, crypto+disabled
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2014/12/29/8
Whiteboard: A3 [glsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2014-12-31 15:31:45 UTC
From ${URL} :

I found multiple vulnerabilities in GPG2.
Could some CVE-ID(s) be assigned please.
Patches were provided by multiple people.

--
Double free in scd/command.c:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773471

Double free in sm/minip12.c:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773472


These two seem related in code:
Return after free in sm/gpgsm.c:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773473
Return after free in dirmngr/ldapserver.c:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773523


Commit:
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=ed8383c618e124cfa708c9ee87563fcdf2f4649c
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=b0b3803e8c2959dd67ca96debc54b5c6464f0d41
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=abd5f6752d693b7f313c19604f0723ecec4d39a6


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Alon Bar-Lev (RETIRED) gentoo-dev 2014-12-31 18:29:18 UTC
Added:
gnupg-2.0.26-r3
gnupg-2.1.1-r1

gnupg-2.0.26-r3 can be marked as stable.
Comment 2 Kristian Fiskerstrand (RETIRED) gentoo-dev 2014-12-31 18:59:46 UTC
I'd prefer to wait a bit to see if we get an upstream release instead of stabilizing specific revisions/patches for these particular issues.
Comment 3 Alon Bar-Lev (RETIRED) gentoo-dev 2015-01-11 22:06:39 UTC
(In reply to Kristian Fiskerstrand from comment #2)
> I'd prefer to wait a bit to see if we get an upstream release instead of
> stabilizing specific revisions/patches for these particular issues.

no upstream yet, can we progress?
Comment 4 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-01-12 11:42:31 UTC
(In reply to Alon Bar-Lev from comment #3)
> (In reply to Kristian Fiskerstrand from comment #2)
> > I'd prefer to wait a bit to see if we get an upstream release instead of
> > stabilizing specific revisions/patches for these particular issues.
> 
> no upstream yet, can we progress?

Yes. Arches, please stabilize
=app-crypt/gnupg-2.0.26-r3

Stable targets: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
Comment 5 Jeroen Roovers (RETIRED) gentoo-dev 2015-01-13 08:58:24 UTC
Stable for HPPA.
Comment 6 Agostino Sarubbo gentoo-dev 2015-01-13 13:46:33 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2015-01-14 13:52:56 UTC
ppc64 stable
Comment 8 Andreas Schürch gentoo-dev 2015-01-14 20:38:45 UTC
x86 done, thanks!
Comment 9 Agostino Sarubbo gentoo-dev 2015-01-15 08:40:58 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2015-01-16 08:09:58 UTC
ia64 stable
Comment 11 Markus Meier gentoo-dev 2015-01-17 20:05:43 UTC
arm stable
Comment 12 Agostino Sarubbo gentoo-dev 2015-01-25 11:22:06 UTC
alpha stable
Comment 13 Agostino Sarubbo gentoo-dev 2015-02-16 10:22:07 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 14 Yury German Gentoo Infrastructure gentoo-dev 2015-02-16 14:54:56 UTC
Arches, Thank you for your work.
New GLSA Request filed.

Maintainer(s), please drop the vulnerable version(s).
Comment 15 Kristian Fiskerstrand (RETIRED) gentoo-dev 2015-02-16 20:00:01 UTC
Cleanup done: 

16 Feb 2015; Kristian Fiskerstrand <k_f@gentoo.org> -gnupg-2.0.25.ebuild,
-gnupg-2.0.26-r2.ebuild, -gnupg-2.0.26.ebuild:
Cleanup for security bug 534110
Comment 16 Yury German Gentoo Infrastructure gentoo-dev 2016-06-05 20:44:35 UTC
This issue was resolved and addressed in
 GLSA 201606-04 at https://security.gentoo.org/glsa/201606-04
by GLSA coordinator Yury German (BlueKnight)