A vulnerability in GnuPG can lead to a Denial of Service condition.
Package | app-crypt/gnupg on all architectures |
---|---|
Affected versions | < 2.0.24 |
Unaffected versions | >= 2.0.24 revision >= 1.4.17 revision >= 1.4.18 revision >= 1.4.19 revision >= 1.4.20 revision >= 1.4.21 |
The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of cryptographic software.
GnuPG does not properly handle a specially crated compressed packet resulting in an infinite loop.
A context-dependent attacker can cause a Denial of Service.
There is no known workaround at this time.
All GnuPG 2.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.24"
All GnuPG 1.4 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.17"
Release date
July 16, 2014
Latest revision
July 16, 2014: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries