Mailinglist Archive: opensuse-updates (72 mails)

< Previous Next >
openSUSE-SU-2010:0479-1 (important): gpg2: reuses a freed pointer when verifying a signature
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Thu, 5 Aug 2010 23:08:25 +0200 (CEST)
  • Message-id: <20100805210826.CF018BE29@xxxxxxxxxxxxxx>
openSUSE Security Update: gpg2: reuses a freed pointer when verifying a
signature
______________________________________________________________________________

Announcement ID: openSUSE-SU-2010:0479-1
Rating: important
References: #625947
Cross-References: CVE-2010-2547
Affected Products:
openSUSE 11.3
openSUSE 11.2
openSUSE 11.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

GnuPG2 was vulnerable to arbitrary code execution by
context-dependent attackers because of reusing a freed
pointer when verifying a signature or importing a
certificate with many "Subject Alternate Names".
(CVE-2010-2547)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch gpg2-2819

- openSUSE 11.2:

zypper in -t patch gpg2-2819

- openSUSE 11.1:

zypper in -t patch gpg2-2819

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 11.3 (i586 src x86_64):

gpg2-2.0.15-5.1.1

- openSUSE 11.3 (noarch):

gpg2-lang-2.0.15-5.1.1

- openSUSE 11.2 (i586 src x86_64):

gpg2-2.0.12-2.4.1

- openSUSE 11.2 (noarch):

gpg2-lang-2.0.12-2.4.1

- openSUSE 11.1 (i586 ppc src x86_64):

gpg2-2.0.9-25.109.1

- openSUSE 11.1 (i586 ppc x86_64):

gpg2-lang-2.0.9-25.109.1


References:

http://support.novell.com/security/cve/CVE-2010-2547.html
https://bugzilla.novell.com/625947


< Previous Next >
This Thread
  • No further messages