~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2006-6169

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2006-11-29
2
 
PublicDate: 2006-11-29
3
 
Candidate: CVE-2006-6169
4
 
References:
5
 
 https://usn.ubuntu.com/usn/usn-393-2
6
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169
7
 
Description:
8
 
 Heap-based buffer overflow in the ask_outfile_name function in openfile.c
9
 
 for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow
10
 
 attackers to execute arbitrary code via messages with "C-escape"
11
 
 expansions, which cause the make_printable_string function to return a
12
 
 longer string than expected while constructing a prompt.
13
 
Ubuntu-Description:
14
 
Notes:
15
 
Bugs:
16
 
upstream_gnupg2: 2.0.0
17
 
dapper_gnupg2: ignored (reached end-of-life)
18
 
edgy_gnupg2: released (1.9.21-0ubuntu5.3)
19
 
feisty_gnupg2: released (2.0.3-1ubuntu1)
20
 
gutsy_gnupg2: not-affected
21
 
hardy_gnupg2: not-affected
22
 
intrepid_gnupg2: not-affected
23
 
jaunty_gnupg2: not-affected
24
 
karmic_gnupg2: not-affected
25
 
devel_gnupg2: not-affected
26
 
upstream_gnupg: 1.4.7
27
 
dapper_gnupg: released (1.4.2.2-1ubuntu2.5)
28
 
edgy_gnupg: released (1.4.3-2ubuntu3.3)
29
 
feisty_gnupg: released (1.4.6-1ubuntu2)
30
 
gutsy_gnupg: released (1.4.6-1ubuntu2)
31
 
hardy_gnupg: released (1.4.6-1ubuntu2)
32
 
intrepid_gnupg: released (1.4.6-1ubuntu2)
33
 
jaunty_gnupg: released (1.4.6-1ubuntu2)
34
 
karmic_gnupg: released (1.4.6-1ubuntu2)
35
 
devel_gnupg: released (1.4.6-1ubuntu2)