From wk ΞΑ gnupg.org Mon Nov 4 09:22:49 2013
From: wk ΞΑ gnupg.org (Werner Koch)
Date: Mon, 04 Nov 2013 09:22:49 +0100
Subject: [gnupg-ru] [Announce] Details on the GnuPG 1.4.15 and 2.0.22 release
In-Reply-To: <877gds3xkv.fsf@vigenere.g10code.de> (Werner Koch's message of
"Sat, 05 Oct 2013 10:56:32 +0200")
References: <877gds3xkv.fsf@vigenere.g10code.de>
Message-ID: <87fvrck23q.fsf@vigenere.g10code.de>
Hi!
Taylor asked me to forward this background info:
On Sat, 5 Oct 2013 10:56, wk ΞΑ gnupg.org said:
> not yet been seen in the wild. Details of the attack will eventually
> be published by its inventor.
The zlib compression language that OpenPGP uses is powerful enough to
express an OpenPGP compression quine -- that is, an OpenPGP compressed
data packet that decompresses to itself -- causing infinite nesting of
OpenPGP packets. Source code to generate such a quine is at
.
When fed the quine, older versions of GnuPG would blow the stack and
crash. GnuPG 1.4.15 and GnuPG 2.0.22 avoid this by setting a small
constant bound on the depth of packet nesting.
(This is similar to Tavis Ormandy's IPcomp compression quine, reported
in CVE-2011-1547, which I didn't know about at the time I made the
OpenPGP compression quine. Both of us had read Russ Cox's article on
zlib compression quines: .)
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
_______________________________________________
Gnupg-announce mailing list
Gnupg-announce ΞΑ gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-announce