USN-389-1: GnuPG vulnerability
29 November 2006
GnuPG vulnerability
Releases
Details
A buffer overflow was discovered in GnuPG. By tricking a user into
running gpg interactively on a specially crafted message, an attacker
could execute arbitrary code with the user's privileges. This
vulnerability is not exposed when running gpg in batch mode.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 6.10
-
gnupg
-
1.4.3-2ubuntu3.1
Ubuntu 6.06
-
gnupg
-
1.4.2.2-1ubuntu2.3
Ubuntu 5.10
-
gnupg
-
1.4.1-1ubuntu1.5
In general, a standard system upgrade is sufficient to effect the
necessary changes.