CVE-2006-6169
Publication date 29 November 2006
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with “C-escape” expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnupg | 9.10 karmic |
Fixed 1.4.6-1ubuntu2
|
9.04 jaunty |
Fixed 1.4.6-1ubuntu2
|
|
8.10 intrepid |
Fixed 1.4.6-1ubuntu2
|
|
8.04 LTS hardy |
Fixed 1.4.6-1ubuntu2
|
|
7.10 gutsy |
Fixed 1.4.6-1ubuntu2
|
|
7.04 feisty |
Fixed 1.4.6-1ubuntu2
|
|
6.10 edgy |
Fixed 1.4.3-2ubuntu3.3
|
|
6.06 LTS dapper |
Fixed 1.4.2.2-1ubuntu2.5
|
|
gnupg2 | 9.10 karmic |
Not affected
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy |
Not affected
|
|
7.04 feisty |
Fixed 2.0.3-1ubuntu1
|
|
6.10 edgy |
Fixed 1.9.21-0ubuntu5.3
|
|
6.06 LTS dapper | Ignored end of life |