1
PublicDateAtUSN: 2006-11-29
3
Candidate: CVE-2006-6169
5
https://usn.ubuntu.com/usn/usn-393-2
6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169
8
Heap-based buffer overflow in the ask_outfile_name function in openfile.c
9
for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow
10
attackers to execute arbitrary code via messages with "C-escape"
11
expansions, which cause the make_printable_string function to return a
12
longer string than expected while constructing a prompt.
16
upstream_gnupg2: 2.0.0
17
dapper_gnupg2: ignored (reached end-of-life)
18
edgy_gnupg2: released (1.9.21-0ubuntu5.3)
19
feisty_gnupg2: released (2.0.3-1ubuntu1)
20
gutsy_gnupg2: not-affected
21
hardy_gnupg2: not-affected
22
intrepid_gnupg2: not-affected
23
jaunty_gnupg2: not-affected
24
karmic_gnupg2: not-affected
25
devel_gnupg2: not-affected
27
dapper_gnupg: released (1.4.2.2-1ubuntu2.5)
28
edgy_gnupg: released (1.4.3-2ubuntu3.3)
29
feisty_gnupg: released (1.4.6-1ubuntu2)
30
gutsy_gnupg: released (1.4.6-1ubuntu2)
31
hardy_gnupg: released (1.4.6-1ubuntu2)
32
intrepid_gnupg: released (1.4.6-1ubuntu2)
33
jaunty_gnupg: released (1.4.6-1ubuntu2)
34
karmic_gnupg: released (1.4.6-1ubuntu2)
35
devel_gnupg: released (1.4.6-1ubuntu2)