From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782276: """ While dealing with the dpkg security issue (fixed in 1.16.16, and the upcoming 1.17.25), I checked other implementations and found that it also affects the python-debian modules. The parser is too lax and accepts any whitespace while GnuPG only accepts [\r\t ] at the end of an Armor Header line, which means that a message could be doctored to include lines that will be ignored by GnuPG but parsed by the python-debian modules. """ This issue is similar to bug 1210748, the patch is attached to the Debian bug.
Created python-debian tracking bugs for this issue: Affects: fedora-all [bug 1210758] Affects: epel-all [bug 1210759]
Created attachment 1014333 [details] upstream patch
Upstream released new version 0.1.27, which fix this issue. The tar file will be accessible in matter of hours, I will rebase the package tomorrow.
Analysis: The vulnerable line was introduced in commit 785cef6faca4496549946a552a03b988871b6e3b authored 2014-08-25 as a fix for #695932. The 0.1.21, which is currently present in Fedora and EPEL was released 2014-06-01 and does not contain the vulnerable code.