| Summary: | gnupg, gnupg2 new security issues CVE-2015-1606 and CVE-2015-1607 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | minor | ||
| Priority: | Normal | CC: | cooker, sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/636681/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK | ||
| Source RPM: | gnupg, gnupg2 | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-03-13 15:23:45 CET
David Walser
2015-03-13 16:05:10 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/636681/ LWN reference for CVE-2015-1607: http://lwn.net/Vulnerabilities/638726/ Ubuntu has issued an advisory for this today (April 1): http://www.ubuntu.com/usn/usn-2554-1/ You should submit them to 4/updates testing then, as nobody is listed as maintainer. CC:
(none) =>
cooker No, these ones don't need their own build. As I already said, these fixes are in SVN and will be included in the *next* update, whenever there's a more important issue to fix. Submitting this update now to get it in before Mageia 4 EOL. Testing procedures: https://bugs.mageia.org/show_bug.cgi?id=15441#c2 Advisory: ======================== Updated gnupg and gnupg2 packages fix security vulnerabilities: Hanno Böck discovered that GnuPG incorrectly handled certain malformed keyrings. If a user or automated system were tricked into opening a malformed keyring, a remote attacker could use this issue to cause GnuPG to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2015-1606, CVE-2015-1607). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607 http://www.ubuntu.com/usn/usn-2554-1/ ======================== Updated packages in core/updates_testing: ======================== gnupg-1.4.16-1.3.mga4 gnupg2-2.0.22-3.2.mga4 from SRPMS: gnupg-1.4.16-1.3.mga4.src.rpm gnupg2-2.0.22-3.2.mga4.src.rpm Assignee:
bugsquad =>
qa-bugs Testing complete Mageia 4 i586 using the procedure. Whiteboard:
has_procedure =>
has_procedure MGA4-32-OK Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0359.html Status:
NEW =>
RESOLVED |