~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
PublicDateAtUSN: 2006-11-29
PublicDate: 2006-11-29
Candidate: CVE-2006-6169
References:
 http://www.ubuntu.com/usn/usn-393-2
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169
Description:
 Heap-based buffer overflow in the ask_outfile_name function in openfile.c
 for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow
 attackers to execute arbitrary code via messages with "C-escape"
 expansions, which cause the make_printable_string function to return a
 longer string than expected while constructing a prompt.
Ubuntu-Description:
Notes:
Bugs:
upstream_gnupg2: 2.0.0
dapper_gnupg2: ignored (reached end-of-life)
edgy_gnupg2: released (1.9.21-0ubuntu5.3)
feisty_gnupg2: released (2.0.3-1ubuntu1)
gutsy_gnupg2: not-affected
hardy_gnupg2: not-affected
intrepid_gnupg2: not-affected
jaunty_gnupg2: not-affected
karmic_gnupg2: not-affected
devel_gnupg2: not-affected
upstream_gnupg: 1.4.7
dapper_gnupg: released (1.4.2.2-1ubuntu2.5)
edgy_gnupg: released (1.4.3-2ubuntu3.3)
feisty_gnupg: released (1.4.6-1ubuntu2)
gutsy_gnupg: released (1.4.6-1ubuntu2)
hardy_gnupg: released (1.4.6-1ubuntu2)
intrepid_gnupg: released (1.4.6-1ubuntu2)
jaunty_gnupg: released (1.4.6-1ubuntu2)
karmic_gnupg: released (1.4.6-1ubuntu2)
devel_gnupg: released (1.4.6-1ubuntu2)