|
Message-ID: <20200903180936.GB16543@suse.de> Date: Thu, 3 Sep 2020 20:09:36 +0200 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Subject: GNUPG released with AEAD sec fix CVE-2020-25125 Hi, gnupg just released a security fix update. CVE-2020-25125 https://lists.gnupg.org/pipermail/gnupg-announce/2020q3/000448.html ... Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour. Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug. Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated attacker. The major hurdle for an attacker is that only every second byte is under their control with every first byte having a fixed value of 0x04. Software distribution verification should not be affected by this bug because such a system uses a curated list of keys. A CVE-id has not yet been assigned. We track this bug at https://dev.gnupg.org/T5050 ... Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.