Bugzilla – Bug 798465
VUL-1: CVE-2012-6085: gnupg: potential database corruption
Last modified: 2018-10-19 18:21:07 UTC
A report at Red Hat [1] from 2013-01-01 describes an issue with GnuPG that can cause the public key db to end up being corrupted / cause a memory corruption. Original issue reported upstream [2]. [1] https://bugzilla.redhat.com/show_bug.cgi?id=891142 (example + patches included) [2] https://bugs.g10code.com/gnupg/issue1455
The SWAMPID for this issue is 52394. This issue was rated as low. Please submit fixed packages until 2013-06-05. Also create a patchinfo file using this link: https://swamp.suse.de/webswamp/wf/52394
Update started. Please submit to 11-SP2 and 10-SP4.
Do we need updates for any other distribution? Or is my work here done and I can reassign this bug back to security-team?
Security wants always wants to fix all affected products. Thank you.
openSUSE packages submitted.
This is an autogenerated message for OBS integration: This bug (798465) was mentioned in https://build.opensuse.org/request/show/175760 Maintenance /
This is an autogenerated message for OBS integration: This bug (798465) was mentioned in https://build.opensuse.org/request/show/176623 Maintenance /
openSUSE-SU-2013:0849-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 780943,798465 CVE References: CVE-2012-6085 Sources used: openSUSE 12.2 (src): gpg2-2.0.19-2.4.1 openSUSE 12.1 (src): gpg2-2.0.18-7.4.1
This is an autogenerated message for OBS integration: This bug (798465) was mentioned in https://build.opensuse.org/request/show/177209 Evergreen:11.2 / gpg2
openSUSE-SU-2013:0880-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 780943,798465 CVE References: CVE-2012-6085 Sources used: openSUSE 12.3 (src): gpg2-2.0.19-5.4.1
openSUSE-SU-2013:0957-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 780943,798465 CVE References: CVE-2012-6085 Sources used: openSUSE 11.4 (src): gpg2-2.0.16-10.1
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: gpg2, gpg2-debuginfo Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-DESKTOP 10-SP4 (i386, x86_64) SLE-SERVER 10-SP4 (i386, ia64, ppc, s390x, x86_64)
Update released for: gpg2, gpg2-debuginfo Products: SLE-DESKTOP 10-SP4 (i386, x86_64) SLE-SERVER 10-SP4 (i386, ia64, ppc, s390x, x86_64)
released
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP3-LTSS (i386, s390x, x86_64)
Update released for: gpg, gpg-debuginfo Products: SLE-SERVER 10-SP4-LTSS (i386, s390x, x86_64)
The SWAMPID for this issue is 57003. This issue was rated as moderate. Please submit fixed packages until 2014-04-25. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
Update released for: gpg2, gpg2-debuginfo, gpg2-debugsource, gpg2-lang Products: SLE-DEBUGINFO 11-SP1 (i386, s390x, x86_64) SLE-SERVER 11-SP1-LTSS (i386, s390x, x86_64)
SUSE-SU-2014:0750-1: An update that contains security fixes can now be installed. Category: security (moderate) Bug References: 778723,780943,798465,808958,840510,844175 CVE References: Sources used: SUSE Linux Enterprise Server 11 SP1 LTSS (src): gpg2-2.0.9-25.33.37.6
*** Bug 880249 has been marked as a duplicate of this bug. ***
*** Bug 876581 has been marked as a duplicate of this bug. ***