Your message dated Mon, 09 May 2005 19:02:52 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#300859: fixed in gnupg 1.4.1-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 22 Mar 2005 10:45:30 +0000 >From [EMAIL PROTECTED] Tue Mar 22 02:45:30 2005 Return-path: <[EMAIL PROTECTED]> Received: from moutng.kundenserver.de [212.227.126.189] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DDgt7-0007Y6-00; Tue, 22 Mar 2005 02:45:29 -0800 Received: from [212.227.126.207] (helo=mrelayng.kundenserver.de) by moutng.kundenserver.de with esmtp (Exim 3.35 #1) id 1DDgt6-00080o-00 for [EMAIL PROTECTED]; Tue, 22 Mar 2005 11:45:28 +0100 Received: from [195.90.9.8] (helo=anton) by mrelayng.kundenserver.de with asmtp (Exim 3.35 #1) id 1DDgt6-00047c-00 for [EMAIL PROTECTED]; Tue, 22 Mar 2005 11:45:28 +0100 Received: by anton (Postfix, from userid 2028) id E79C9B6EC9; Tue, 22 Mar 2005 11:45:27 +0100 (CET) Content-Type: multipart/mixed; boundary="===============2015084441==" MIME-Version: 1.0 From: Moritz Muehlenhoff <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: [CAN-2005-0366] Minor cryptographic flaw in the OpenPGP protocol X-Mailer: reportbug 2.26.1.1.200308291454 Date: Tue, 22 Mar 2005 11:45:27 +0100 Message-Id: <[EMAIL PROTECTED]> X-Provags-ID: kundenserver.de [EMAIL PROTECTED] auth:4ad79d65ac46f2345c6ef2e856c1d9ef Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: This is a multi-part MIME message sent by reportbug. --===============2015084441== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline Package: gnupg Version: 1.4.0-3 Severity: normal Tags: security Serge Mister and Robert Zuccherato have published a paper, which describes an attack against the symmetric encryption as used in the OpenPGP standard. It's not exploitable in regular gnupg operation with a human endpoint. Full details are described at the announce mail at: http://lists.gnupg.org/pipermail/gnupg-announce/2005q1/000191.html I've attached upstream's fix that circumvents the problem by disabling the problematic bits of the OpenPGP standard. Cheers, Moritz -- System Information: Debian Release: 3.0 Architecture: i386 Kernel: Linux anton 2.4.29-univention.1 #1 SMP Thu Jan 27 17:08:46 CET 2005 i686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] Versions of packages gnupg depends on: ii libc6 2.3.2-9 GNU C Library: Shared libraries an ii libldap2 2.1.30-3 OpenLDAP libraries ii makedev 2.3.1-70.3.200407260828 Creates device files in /dev ii zlib1g 1:1.2.2-4.15.200501191530 compression library - runtime -- debconf-show failed --===============2015084441== Content-Type: text/x-c; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="/home/jmm/gpg-can-2005-0366.diff" Index: include/cipher.h =================================================================== RCS file: /cvs/gnupg/gnupg/include/cipher.h,v retrieving revision 1.53.2.6 diff -u -r1.53.2.6 cipher.h --- include/cipher.h 29 Nov 2004 21:07:43 -0000 1.53.2.6 +++ include/cipher.h 8 Feb 2005 04:12:12 -0000 @@ -76,6 +76,7 @@ int keylen; int algo_info_printed; int use_mdc; + int symmetric; byte key[32]; /* this is the largest used keylen (256 bit) */ } DEK; Index: g10/mainproc.c =================================================================== RCS file: /cvs/gnupg/gnupg/g10/mainproc.c,v retrieving revision 1.112.2.27 diff -u -r1.112.2.27 mainproc.c --- g10/mainproc.c 27 Jun 2004 18:26:49 -0000 1.112.2.27 +++ g10/mainproc.c 8 Feb 2005 04:12:13 -0000 @@ -317,6 +317,8 @@ c->dek = passphrase_to_dek( NULL, 0, algo, &enc->s2k, 0, NULL, NULL ); if(c->dek) { + c->dek->symmetric=1; + /* FIXME: This doesn't work perfectly if a symmetric key comes before a public key in the message - if the user doesn't know the passphrase, then there is a chance Index: g10/encr-data.c =================================================================== RCS file: /cvs/gnupg/gnupg/g10/encr-data.c,v retrieving revision 1.29 diff -u -r1.29 encr-data.c --- g10/encr-data.c 29 Jun 2002 13:46:33 -0000 1.29 +++ g10/encr-data.c 8 Feb 2005 04:12:14 -0000 @@ -120,8 +120,7 @@ cipher_sync( dfx.cipher_hd ); p = temp; /* log_hexdump( "prefix", temp, nprefix+2 ); */ - if( p[nprefix-2] != p[nprefix] || p[nprefix-1] != p[nprefix+1] ) { + if( dek->symmetric && (p[nprefix-2] != p[nprefix] || p[nprefix-1] != p[nprefix+1]) ) { rc = G10ERR_BAD_KEY; goto leave; } -------------- next part -------------- Index: include/cipher.h =================================================================== RCS file: /cvs/gnupg/gnupg/include/cipher.h,v retrieving revision 1.63 diff -u -r1.63 cipher.h --- include/cipher.h 29 Nov 2004 21:14:18 -0000 1.63 +++ include/cipher.h 8 Feb 2005 04:10:29 -0000 @@ -75,6 +75,7 @@ int keylen; int algo_info_printed; int use_mdc; + int symmetric; byte key[32]; /* this is the largest used keylen (256 bit) */ } DEK; Index: g10/mainproc.c =================================================================== RCS file: /cvs/gnupg/gnupg/g10/mainproc.c,v retrieving revision 1.161 diff -u -r1.161 mainproc.c --- g10/mainproc.c 21 Oct 2004 19:18:47 -0000 1.161 +++ g10/mainproc.c 8 Feb 2005 04:10:30 -0000 @@ -330,6 +330,8 @@ if(c->dek) { + c->dek->symmetric=1; + /* FIXME: This doesn't work perfectly if a symmetric key comes before a public key in the message - if the user doesn't know the passphrase, then there is Index: g10/encr-data.c =================================================================== RCS file: /cvs/gnupg/gnupg/g10/encr-data.c,v retrieving revision 1.30 diff -u -r1.30 encr-data.c --- g10/encr-data.c 8 Oct 2004 21:54:26 -0000 1.30 +++ g10/encr-data.c 8 Feb 2005 04:10:30 -0000 @@ -125,6 +125,6 @@ cipher_sync( dfx.cipher_hd ); p = temp; /* log_hexdump( "prefix", temp, nprefix+2 ); */ - if( p[nprefix-2] != p[nprefix] || p[nprefix-1] != p[nprefix+1] ) { + if( dek->symmetric && (p[nprefix-2] != p[nprefix] || p[nprefix-1] != p[nprefix+1]) ) { rc = G10ERR_BAD_KEY; goto leave; } --===============2015084441==-- --------------------------------------- Received: (at 300859-close) by bugs.debian.org; 9 May 2005 23:08:09 +0000 >From [EMAIL PROTECTED] Mon May 09 16:08:09 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DVHM9-0003UV-00; Mon, 09 May 2005 16:08:09 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DVHH2-0005S8-00; Mon, 09 May 2005 19:02:52 -0400 From: James Troup <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#300859: fixed in gnupg 1.4.1-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 09 May 2005 19:02:52 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: gnupg Source-Version: 1.4.1-1 We believe that the bug you reported is fixed in the latest version of gnupg, which is due to be installed in the Debian FTP archive: gnupg_1.4.1-1.diff.gz to pool/main/g/gnupg/gnupg_1.4.1-1.diff.gz gnupg_1.4.1-1.dsc to pool/main/g/gnupg/gnupg_1.4.1-1.dsc gnupg_1.4.1-1_i386.deb to pool/main/g/gnupg/gnupg_1.4.1-1_i386.deb gnupg_1.4.1.orig.tar.gz to pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz gpgv-udeb_1.4.1-1_i386.udeb to pool/main/g/gnupg/gpgv-udeb_1.4.1-1_i386.udeb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. James Troup <[EMAIL PROTECTED]> (supplier of updated gnupg package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 9 May 2005 23:41:50 +0100 Source: gnupg Binary: gnupg gpgv-udeb Architecture: source i386 Version: 1.4.1-1 Distribution: unstable Urgency: low Maintainer: James Troup <[EMAIL PROTECTED]> Changed-By: James Troup <[EMAIL PROTECTED]> Description: gnupg - GNU privacy guard - a free PGP replacement gpgv-udeb - minimal signature verification tool (udeb) Closes: 299814 300859 307203 Changes: gnupg (1.4.1-1) unstable; urgency=low . * New upstream release. Closes: #307203 * Fixes mis-selection of encryption key. Closes: #299814 * Countermeasures against the Mister/Zuccherato CFB attack. Closes: #300859 * 18_ca_po_update.dpatch, 21_strgutil_update.dpatch: dropped - merged upstream. * debian/rules (build-deb-stamp): don't forcefully regenerate po/ca.gmo. (clean): likewise, don't remove po/ca.gmo. Files: 1d8bde243e7024b1cc7e137e6729881e 1304 utils standard gnupg_1.4.1-1.dsc 1cc77c6943baaa711222e954bbd785e5 4059170 utils standard gnupg_1.4.1.orig.tar.gz cc11b349b662bf3810470e0a52ef545e 16502 utils standard gnupg_1.4.1-1.diff.gz e92a533403a9523b92631581898f9c64 1908156 utils standard gnupg_1.4.1-1_i386.deb 1a1aaae3fbcd33fddddeed0c2d5d4cf0 129262 debian-installer extra gpgv-udeb_1.4.1-1_i386.udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iQIVAwUBQn/pFtfD8TGrKpH1AQIrPA//bOtX1tDgXM1B1hK+p1WQhOshjmvS2zP2 KiEVB7jJJDnaV6eFJ2yoVlJcbFMjNt0xHktGycZq+4Yfq9XVf04S3dQ7GuYl0Ejw bmg+s3TKOqR9nPjY0wfnd43rdxUAAg1aLzA1hsZNAQZ2AHyysG67/e7TGJOCvvSE SB58c18/eKvuFkkIDkssxn9wsQEkbLw7V5gRnzlcH8JhKfGCvtn1Vp9aXVnCpxuJ +oA++CxctFQ69maMMwhDSI77DwRZk6b1N6vMsLctmlV4awY7275QMJn98rHw2keL 527gPBJwKVI8xr31Y5nbfLdcm2KQUp83qv+pDcaaqOT3ZzjQa5EEla9PyfQt4tO0 QhyG70jwYZkpqztu2Epiq5ZDxMToCq/elS+p4NiqbxpNF5+hfCWInIn8Ktk9mWV2 j0SyuZxD1ZNcoU60xOdSk5X2LrHgSqVopjDr1oivT+7dvZ37/8SMprV1Gp6nkY26 6f830EulFpXSGK3msbYfTXJ2vg1i/wtaFPC/mqIbazazGUP7gWP/KHrAFiWCg/vD oFKGgWCDtWoeYkYCS92D7D5HfuMwU8evecWWg3c1eKWeWXe7Qw73JcLueuOnaYzV hs53u5LBtwsm40JIebsZgnpwNvrIo+ysiGAR9P/q0uPQh6pno/sU4uieVCAonUyI HL08xa3PAzU= =Ofao -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]