Bug 1112509 (CVE-2014-4617)
Summary: | CVE-2014-4617 gnupg: infinite loop when decompressing data packets | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bcl, carnil, pchavan, rdieter, ruckc, sardella |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | gnupg 1.4.17, gnupg 2.0.24 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-06-15 15:04:02 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1112510, 1112511 | ||
Bug Blocks: | 1112513, 1112679, 1112680 |
Description
Murray McAllister
2014-06-24 06:07:28 UTC
Created gnupg2 tracking bugs for this issue: Affects: fedora-all [bug 1112510] Affects: epel-5 [bug 1112511] gnupg in Fedora was affected, but I've not filed bugs and marked it as 'notaffected' due to the fixed version already being in Testing. *** Bug 1112677 has been marked as a duplicate of this bug. *** *** Bug 1112678 has been marked as a duplicate of this bug. *** This issue was also corrected in 2.0.24: http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html Forgot to note it was assigned CVE-2014-4617: http://openwall.com/lists/oss-security/2014/06/24/14 gnupg2-2.0.24-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. Statement: This issue affects the versions of gnupg2 as shipped with Red Hat Enterprise Linux 5, 6 and 7 and gnupg as shipped with Red Hat Enterprise Linux 5. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. gnupg2-2.0.24-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. What is the status of closing this on RHEL5/6? I have security nazi's begging for it, or at least an explanation of non-applicability. (In reply to ruckc from comment #12) > What is the status of closing this on RHEL5/6? I have security nazi's > begging for it, or at least an explanation of non-applicability. Hello, This has been deferred for RHEL 5 and 6: https://bugzilla.redhat.com/show_bug.cgi?id=1112509#c10 We do not have any immediate plans to fix the issue. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2014-4617 |