Lucene search

K
osvGoogleOSV:DSA-3005-1
HistoryAug 14, 2014 - 12:00 a.m.

gpgme1.0 - security update

2014-08-1400:00:00
Google
osv.dev
10

EPSS

0.036

Percentile

91.6%

TomĂĄĹĄ Trnka discovered a heap-based buffer overflow within the gpgsm
status handler of GPGME, a library designed to make access to GnuPG
easier for applications. An attacker could use this issue to cause an
application using GPGME to crash (denial of service) or possibly to
execute arbitrary code.

For the stable distribution (wheezy), this problem has been fixed in
version 1.2.0-1.4+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1.5.1-1.

For the unstable distribution (sid), this problem has been fixed in
version 1.5.1-1.

We recommend that you upgrade your gpgme1.0 packages.