[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2015-04-01 Thread Marc Deslauriers
This should now be fixed in stable releases also in this update: http://www.ubuntu.com/usn/usn-2554-1/ -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu. https://bugs.launchpad.net/bugs/1371766 Title: Latest

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2015-01-22 Thread Launchpad Bug Tracker
This bug was fixed in the package gnupg - 1.4.18-6ubuntu1 --- gnupg (1.4.18-6ubuntu1) vivid; urgency=medium * Resynchronise with Debian (LP: #1371766). Remaining changes: - Disable mlock() test since it fails with ulimit 0 (on buildds). - Set gpg (or gpg2) and gpgsm to use

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-12-04 Thread Bug Watch Updater
** Changed in: gnupg (Debian) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu. https://bugs.launchpad.net/bugs/1371766 Title: Latest CVE-2014-5270 patch breaks ElGamal keys

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-25 Thread Ciaby
Small update on the upstream issue I opened: there is no way for GnuPG to support keys larger than 4k, although it's a one-line patch. Please read the explanation in the link above. I see two possible outcomes of this: 1) Just add a tiny patch which increase the secure memory to 128k, keep the

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-24 Thread Ciaby
Bug opened: https://bugs.g10code.com/gnupg/issue1732 ** Bug watch added: GnuPG Bugs #1732 https://bugs.g10code.com/gnupg/issue1732 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu.

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-22 Thread Ciaby
So, what's the deal with this? -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu. https://bugs.launchpad.net/bugs/1371766 Title: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k Status in “gnupg”

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-22 Thread Marc Deslauriers
Please report this issue to the gnupg project at the following link, and link the bug here: https://bugs.g10code.com/ -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu. https://bugs.launchpad.net/bugs/1371766

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-20 Thread Ciaby
...and it works. So, the problem is: with the latest patch, the usual amount of secure memory (32768 bytes) is not sufficient anymore. I just raised it to another arbitrary number (262144) and it works fine. Wouldn't it be sufficient to just raise secmem_init() in g10/gpg.c ? -- You received

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-19 Thread Marc Deslauriers
This is an upstream decision. In fact, they've now limited the size of ElGamal keys to 4096 with the following commit: http://git.gnupg.org/cgi- bin/gitweb.cgi?p=gnupg.git;a=commit;h=aae7ec516b79e20938c56fd48fc0bc9d2116426c Another relevant Debian bug: https://bugs.debian.org/cgi-

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-19 Thread Ciaby
Well, the first commit just limits the key generation size. I'm fine with that, but breaking GnuPG for _currently_ used keys it's a totally different matter. I have been using this key for a while (let's say, a year and a half?) without any problems. This, for me, is clearly a regression. The

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-19 Thread Seth Arnold
Ciaby, perhaps try raising your max locked memory resource limit. See setrlimit(2) and limits.conf(5) manpages for details. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu.

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-19 Thread Bug Watch Updater
** Changed in: gnupg (Debian) Status: Unknown = New -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to gnupg in Ubuntu. https://bugs.launchpad.net/bugs/1371766 Title: Latest CVE-2014-5270 patch breaks ElGamal keys of

[Touch-packages] [Bug 1371766] Re: Latest CVE-2014-5270 patch breaks ElGamal keys of 16k

2014-09-19 Thread Ciaby
These are the current limits: ciaby@lila:~$ ulimit -a core file size (blocks, -c) 0 data seg size (kbytes, -d) unlimited scheduling priority (-e) 0 file size (blocks, -f) unlimited pending signals (-i) 23805 max locked memory