[ASA-202007-6] libjcat: insufficient validation
Morten Linderud
foxboron at archlinux.org
Fri Jul 31 20:03:06 UTC 2020
Arch Linux Security Advisory ASA-202007-6
=========================================
Severity: High
Date : 2020-07-31
CVE-ID : CVE-2020-10759
Package : libjcat
Type : insufficient validation
Remote : Yes
Link : https://security.archlinux.org/AVG-1185
Summary
=======
The package libjcat before version 0.1.3-1 is vulnerable to
insufficient validation.
Resolution
==========
Upgrade to 0.1.3-1.
# pacman -Syu "libjcat>=0.1.3-1"
The problem has been fixed upstream in version 0.1.3.
Workaround
==========
None.
Description
===========
A PGP signature verification bypass has been found in fwupd prior to
1.4.0, and in libjcat <= 0.1.2. The issue is that if a detached
signature is actually a PGP message, gpgme_op_verify() returns the
rather perplexing GPG_ERR_NO_ERROR, and then gpgme_op_verify_result()
builds an empty list.
Impact
======
A local attacker could pass signature validation with a crafted
message.
References
==========
https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md
https://github.com/hughsie/libjcat/commit/839b89f
https://security.archlinux.org/CVE-2020-10759
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20200731/6aa77b1c/attachment.sig>
More information about the arch-security
mailing list