Your submission was sent successfully! Close

USN-332-1: gnupg vulnerability

03 August 2006

gnupg vulnerability



Evgeny Legerov discovered that gnupg did not sufficiently check the
validity of the comment and a control field. Specially crafted GPG
data could cause a buffer overflow. This could be exploited to execute
arbitrary code with the user's privileges if an attacker can trick an
user into processing a malicious encrypted/signed document with gnupg.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06
  • gnupg -
Ubuntu 5.10
  • gnupg - 1.4.1-1ubuntu1.4
Ubuntu 5.04
  • gnupg - 1.2.5-3ubuntu5.5

In general, a standard system upgrade is sufficient to effect the
necessary changes.