Bug#381204: GnuPG security hole in memory allocation

2006-08-04 Thread Werner Koch
On Wed, 2 Aug 2006 21:37, Brian M. Carlson said: > I am inclined to say that this is grave, but since gnupg tends to do > memory allocation before it drops privileges, you might find that this The allocation problem, which is overflow like malloc(numbercontrolledbyuser+20), can only happen after

Bug#381204: GnuPG security hole in memory allocation

2006-08-03 Thread Martin Pitt
Hi, I extracted a minimal patch from 1.4.5 for the Sarge security update. This has been assigned CVE-2006-3746. Thanks, Martin -- Martin Pitthttp://www.piware.de Ubuntu Developer http://www.ubuntu.com Debian Developer http://www.debian.org In a world without walls and fences, who

Bug#381204: GnuPG security hole in memory allocation

2006-08-02 Thread Brian M. Carlson
Package: gnupg Version: 1.4.3-2 Severity: grave Tags: security GnuPG 1.4.5 corrects some potential security problems in memory allocation. From http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html : * Fixed 2 more possible memory allocation attacks. They are similar to t