[Feisty] GnuPG 2.0 buffer overflow (CVE-2006-6169)

Bug #73985 reported by Michael Bienia
258
Affects Status Importance Assigned to Milestone
gnupg (Ubuntu)
Breezy
Fix Released
High
Kees Cook
Dapper
Fix Released
High
Kees Cook
Edgy
Fix Released
High
Kees Cook
gnupg2 (Debian)
Fix Released
Unknown
gnupg2 (Ubuntu)
Fix Released
High
Kees Cook

Bug Description

Please update to gnupg 2.0.1.

Revision history for this message
Kees Cook (kees) wrote :

USN-389-1

Changed in gnupg2:
assignee: nobody → keescook
importance: Undecided → High
status: Unconfirmed → Fix Released
Revision history for this message
Simon Law (sfllaw) wrote :

This was fixed by 1.4.3-2ubuntu3.1 which went into the edgy-security archive. Upgrading versions is not something we do for stable releases.

Thanks for your report.

Revision history for this message
Michael Bienia (geser) wrote :

As gnupg2 2.0 (in feisty) is also vulnerable this bug report is that it doesn't get forgotten.

Kees Cook (kees)
Changed in gnupg:
status: Fix Released → Confirmed
Changed in gnupg2:
assignee: nobody → keescook
importance: Undecided → High
status: Unconfirmed → Fix Released
assignee: nobody → keescook
importance: Undecided → High
status: Unconfirmed → Fix Released
assignee: nobody → keescook
importance: Undecided → High
status: Unconfirmed → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

This is now in progress for Edgy and Feisty. Sorry about the confusion.

Changed in gnupg2:
status: Confirmed → Fix Committed
Changed in gnupg2:
status: Unknown → Unconfirmed
Changed in gnupg2:
status: Unconfirmed → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

USN-393-2 included this fix.

Changed in gnupg2:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.