Bugtraq mailing list archives
rPSA-2006-0227-1 gnupg
From: rPath Update Announcements <announce-noreply () rpath com>
Date: Wed, 06 Dec 2006 16:34:50 -0500
rPath Security Advisory: 2006-0227-1 Published: 2006-12-06 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Indirect Deterministic Privilege Escalation Updated Versions: gnupg=/conary.rpath.com@rpl:devel//1/1.4.6-0.1- References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235 https://issues.rpath.com/browse/RPL-835 Description: Previous versions of the gnupg package will execute attacker-provided code found in intentionally malformed OpenPGP packets. This allows an attacker to run arbitrary code as the user invoking gpg on the file that contains the malformed packets.
Current thread:
- rPSA-2006-0227-1 gnupg rPath Update Announcements (Dec 06)