-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-2076-1 security@debian.org http://www.debian.org/security/ Florian Weimer July 27, 2010 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : gnupg2 Vulnerability : use-after-free Problem type : local (remote) Debian-specific: no CVE Id(s) : CVE-2010-2547 Debian Bug : 590122 It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution. For the stable distribution (lenny), this problem has been fixed in version 2.0.9-3.1+lenny1. For the unstable distribution (sid), this problem has been fixed in version 2.0.14-2. GnuPG 1 (in the gnupg package) is not affected by this problem. We recommend that you upgrade your gnupg2 packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.dsc Size/MD5 checksum: 1682 405e9811b153ad4251835255e79e50e7 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1.diff.gz Size/MD5 checksum: 40250 48d30d7a03a411929020196f4707e366 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9.orig.tar.gz Size/MD5 checksum: 5198703 3b6b1742509f396d51528e0cd4c76a13 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_alpha.deb Size/MD5 checksum: 506092 20ddf3657383e5a1c128d7a6bbdb0e74 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_alpha.deb Size/MD5 checksum: 345320 b1f3ca05b21ef10e8d57ebcee43a1a04 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_alpha.deb Size/MD5 checksum: 2257726 2fd9ac262c0222a567c6ec26acd9b848 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_amd64.deb Size/MD5 checksum: 2169660 1228c3ab918511ead561ec5331fbfae8 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_amd64.deb Size/MD5 checksum: 316116 593be53060752c8873c7ffc4ce26ad92 http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_amd64.deb Size/MD5 checksum: 462744 f864f696b260080dbee107eff516717b arm architecture (ARM) http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_arm.deb Size/MD5 checksum: 409934 a67874ca01827d29630dc16974b0c934 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_arm.deb Size/MD5 checksum: 279084 6c2417d8ff637d6ddbfbca69ce5a9332 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_arm.deb Size/MD5 checksum: 2083314 a8ee45ea904529b71e990f4d98d6fb05 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_armel.deb Size/MD5 checksum: 413846 d9773981d0b7a17842caf953625af0eb http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_armel.deb Size/MD5 checksum: 2092526 aae6bba65caad81c1aa62cf2315d847a http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_armel.deb Size/MD5 checksum: 281204 d3e5b416ca794e665bc107fd2e3981d0 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_hppa.deb Size/MD5 checksum: 322572 461a593f1fc8f937072b8a6436c6c375 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_hppa.deb Size/MD5 checksum: 2189366 ef71be75e3cc74735f9df4e8a9f4185c http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_hppa.deb Size/MD5 checksum: 467836 2db47e0e38ea653db55cb3a7e67c221f i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_i386.deb Size/MD5 checksum: 421382 9214c8c956347f5535f8284743ab4a56 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_i386.deb Size/MD5 checksum: 2111258 216b70c4252703d2b339e83f49fa48b9 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_i386.deb Size/MD5 checksum: 285638 90d912dabbeb8959e524ac3fe51b62af ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_ia64.deb Size/MD5 checksum: 2545468 e32e42f67b85850c16b1d9467f83609e http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_ia64.deb Size/MD5 checksum: 660374 c3d4f14c6f4a6dfe1a60baf549ff367a http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_ia64.deb Size/MD5 checksum: 444926 3cfeb45a841e64267e391a9f59bb8c68 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mips.deb Size/MD5 checksum: 310928 a937b6b9643afcdc27a49877ab8ce03f http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mips.deb Size/MD5 checksum: 2170292 4ecbf964d264bf5a81fc5cc1f8d4e7e1 http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mips.deb Size/MD5 checksum: 452494 f4aa041b82ce04f44ea3d48e7c9eea90 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_mipsel.deb Size/MD5 checksum: 2156394 86a2f0a81e5c1307a79467c697994b10 http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_mipsel.deb Size/MD5 checksum: 452910 bc88ae07b4f773c2e045959bdcdb088e http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_mipsel.deb Size/MD5 checksum: 310454 54f0e518e34b13207c67d08d244841c3 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_powerpc.deb Size/MD5 checksum: 2181760 94eae71a050c44e50612467ee49cd0ff http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_powerpc.deb Size/MD5 checksum: 321404 5212acf39277399af97165d99e5943a4 http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_powerpc.deb Size/MD5 checksum: 461700 54253f7d1dc99469d6b4679eaabb1e9a s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_s390.deb Size/MD5 checksum: 322328 d0d83de5cacfa74ee3bc90a4de1f52b7 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_s390.deb Size/MD5 checksum: 2183640 c05ab771542dd76f00ba79e2e4a8a195 http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_s390.deb Size/MD5 checksum: 464600 3142165f77991f60305d555ae7a2845c sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/g/gnupg2/gnupg-agent_2.0.9-3.1+lenny1_sparc.deb Size/MD5 checksum: 280932 fe9900d6e347c6e4aa307d0d4d52cee1 http://security.debian.org/pool/updates/main/g/gnupg2/gnupg2_2.0.9-3.1+lenny1_sparc.deb Size/MD5 checksum: 2100032 0e3d68f24cb12da51f37e8166606595b http://security.debian.org/pool/updates/main/g/gnupg2/gpgsm_2.0.9-3.1+lenny1_sparc.deb Size/MD5 checksum: 412538 6f3332ffd017f2787c6427a9700a2928 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJMTz3KAAoJEL97/wQC1SS+s0cIAJh+sB14g8wNL4W5JyNL7qf/ /NgruhXIiDC9SfSnLVDCRsEsldiz1zwWfYswJm7gypXdNaIN8Axeowdvwynx+4YP RzB09x/2+6tfozM9eedGkRAloVAVicdePig+/QoPBBvu89+GyFwp+lcGE6s71pDu cDw5ayAUJQyMeglFVNJ74Fo4NKXo1pQf4QRvlQtLgxQm14gmUFlpzquDeuXQ67+c rPXECc7z3o5rjlRIQFG+t0fg0zSaJeWDvE7mcbA9MOp4M3CSRT3BjGYdmPRKqAcY JrGvwss1DG0QXTNq0FYla2qudWKQCz5BgykzZQ+GZB72pEU/bIvb+OLdeKQfoKk= =eYGC -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/