[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2076-1 gnupg2 -- use-after-free

ID: oval:org.secpod.oval:def:600091Date: (C)2011-01-28   (M)2024-02-08
Class: PATCHFamily: unix




It was discovered that GnuPG 2 uses a freed pointer when verify a signature or importing a certificate with many Subject Alternate Names, potentially leading to arbitrary code execution. For the stable distribution , this problem has been fixed in version 2.0.9-3.1+lenny1. For the unstable distribution , this problem has been fixed in version 2.0.14-2. GnuPG 1 is not affected by this problem. We recommend that you upgrade your gnupg2 packages.

Platform:
Debian 5.0
Product:
gnupg2
Reference:
DSA-2076-1
CVE-2010-2547
CVE    1
CVE-2010-2547
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies