gnupg, gnupg2 vulnerabilities

Related Vulnerabilities: CVE-2013-4351   CVE-2013-4402  

Several security issues were fixed in GnuPG.

Daniel Kahn Gillmor discovered that GnuPG treated keys with empty usage flags as being valid for all usages. (CVE-2013-4351)

9 October 2013

gnupg, gnupg2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.04
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in GnuPG.

Software Description

  • gnupg - GNU privacy guard - a free PGP replacement
  • gnupg2 - GNU privacy guard - a free PGP replacement

Details

Daniel Kahn Gillmor discovered that GnuPG treated keys with empty usage flags as being valid for all usages. (CVE-2013-4351)

Taylor R Campbell discovered that GnuPG incorrectly handled certain OpenPGP messages. If a user or automated system were tricked into processing a specially-crafted message, GnuPG could consume resources, resulting in a denial of service. (CVE-2013-4402)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.04
gnupg - 1.4.12-7ubuntu1.2
gnupg2 - 2.0.19-2ubuntu1.1
Ubuntu 12.10
gnupg - 1.4.11-3ubuntu4.3
gnupg2 - 2.0.17-2ubuntu3.2
Ubuntu 12.04 LTS
gnupg - 1.4.11-3ubuntu2.4
gnupg2 - 2.0.17-2ubuntu2.12.04.3
Ubuntu 10.04 LTS
gnupg - 1.4.10-2ubuntu1.4
gnupg2 - 2.0.14-1ubuntu1.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References