USN-393-2: GnuPG2 vulnerabilities

07 December 2006

GnuPG2 vulnerabilities

Releases

Details

USN-389-1 and USN-393-1 fixed vulnerabilities in gnupg. This update
provides the corresponding updates for gnupg2.

Original advisory details:

A buffer overflow was discovered in GnuPG. By tricking a user into
running gpg interactively on a specially crafted message, an attacker
could execute arbitrary code with the user's privileges. This
vulnerability is not exposed when running gpg in batch mode.
(CVE-2006-6169)

Tavis Ormandy discovered that gnupg was incorrectly using the stack.
If a user were tricked into processing a specially crafted message, an
attacker could execute arbitrary code with the user's privileges.
(CVE-2006-6235)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
  • gnupg2 - 1.9.21-0ubuntu5.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Related notices