Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2005-1686

Publication date 20 May 2005

Last updated 24 July 2024


Ubuntu priority

Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename. NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.

Status

Package Ubuntu Release Status
gedit 7.04 feisty
Fixed 2.14.2-0ubuntu3
6.10 edgy
Fixed 2.14.2-0ubuntu3
6.06 LTS dapper
Fixed 2.14.2-0ubuntu3

References

Related Ubuntu Security Notices (USN)

Other references