USN-393-2: GnuPG2 vulnerabilities
7 December 2006
GnuPG2 vulnerabilities
Releases
Details
USN-389-1 and USN-393-1 fixed vulnerabilities in gnupg. This update
provides the corresponding updates for gnupg2.
Original advisory details:
A buffer overflow was discovered in GnuPG. By tricking a user into
running gpg interactively on a specially crafted message, an attacker
could execute arbitrary code with the user's privileges. This
vulnerability is not exposed when running gpg in batch mode.
(CVE-2006-6169)
Tavis Ormandy discovered that gnupg was incorrectly using the stack.
If a user were tricked into processing a specially crafted message, an
attacker could execute arbitrary code with the user's privileges.
(CVE-2006-6235)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.10
-
gnupg2
-
1.9.21-0ubuntu5.2
In general, a standard system upgrade is sufficient to effect the
necessary changes.
References
Related notices
- USN-393-1: gnupg