Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Pat Riehecky <riehecky-13hema8v3vg <at> public.gmane.org>
Subject: Security ERRATA Moderate: gnupg on SL5.x i386/x86_64
Newsgroups: gmane.linux.scientific.errata
Date: Thursday 24th October 2013 16:49:49 UTC (over 3 years ago)
Synopsis:          Moderate: gnupg security update
Advisory ID:       SLSA-2013:1458-1
Issue Date:        2013-10-24
CVE Numbers:       CVE-2012-6085
                   CVE-2013-4351
                   CVE-2013-4402
                   CVE-2013-4242
--

It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)

A denial of service flaw was found in the way GnuPG parsed certain
compressed OpenPGP packets. An attacker could use this flaw to send
specially crafted input data to GnuPG, making GnuPG enter an infinite loop
when parsing data. (CVE-2013-4402)

It was found that importing a corrupted public key into a GnuPG keyring
database corrupted that keyring. An attacker could use this flaw to trick
a local user into importing a specially crafted public key into their
keyring database, causing the keyring to be corrupted and preventing its
further use. (CVE-2012-6085)

It was found that GnuPG did not properly interpret the key flags in a PGP
key packet. GPG could accept a key for uses not indicated by its holder.
(CVE-2013-4351)
--

SL5
  x86_64
    gnupg-1.4.5-18.el5_10.x86_64.rpm
    gnupg-debuginfo-1.4.5-18.el5_10.x86_64.rpm
  i386
    gnupg-1.4.5-18.el5_10.i386.rpm
    gnupg-debuginfo-1.4.5-18.el5_10.i386.rpm

- Scientific Linux Development Team
 
CD: 4ms