[USN-2307-1] GPGME vulnerability

Marc Deslauriers marc.deslauriers at canonical.com
Wed Aug 6 13:34:37 UTC 2014


==========================================================================
Ubuntu Security Notice USN-2307-1
August 06, 2014

gpgme1.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

GPGME could be made to crash or run programs as your login if it processed
a specially crafted certificate.

Software Description:
- gpgme1.0: GPGME - GnuPG Made Easy (library)

Details:

Tomáš Trnka discovered that GPGME incorrectly handled certain certificate
line lengths. An attacker could use this issue to cause applications using
GPGME to crash, resulting in a denial of service, or possibly execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  libgpgme11                      1.4.3-0.1ubuntu5.1

Ubuntu 12.04 LTS:
  libgpgme11                      1.2.0-1.4ubuntu2.1

Ubuntu 10.04 LTS:
  libgpgme11                      1.2.0-1.2ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2307-1
  CVE-2014-3564

Package Information:
  https://launchpad.net/ubuntu/+source/gpgme1.0/1.4.3-0.1ubuntu5.1
  https://launchpad.net/ubuntu/+source/gpgme1.0/1.2.0-1.4ubuntu2.1
  https://launchpad.net/ubuntu/+source/gpgme1.0/1.2.0-1.2ubuntu1.1


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140806/b7d388c8/attachment.sig>


More information about the ubuntu-security-announce mailing list