USN-332-1: gnupg vulnerability
3 August 2006
gnupg vulnerability
Releases
Details
Evgeny Legerov discovered that gnupg did not sufficiently check the
validity of the comment and a control field. Specially crafted GPG
data could cause a buffer overflow. This could be exploited to execute
arbitrary code with the user's privileges if an attacker can trick an
user into processing a malicious encrypted/signed document with gnupg.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.06
-
gnupg
-
1.4.2.2-1ubuntu2.2
Ubuntu 5.10
-
gnupg
-
1.4.1-1ubuntu1.4
Ubuntu 5.04
-
gnupg
-
1.2.5-3ubuntu5.5
In general, a standard system upgrade is sufficient to effect the
necessary changes.