Thursday, July 29, 2010

Debian Security : New gnupg2 packages fix potential code execution vulnerability

Users of Debian Security please be advised of a New gnupg2 packages fix potential code execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
DSA 2076-1: DSA 2076-1 New gnupg2 packages fix potential code execution
Debian Security
It was discovered that GnuPG 2 uses a freed pointer when verify a

signature or importing a certificate with many Subject Alternate Names,

potentially leading to arbitrary code execution.Read more at www.criticalwatch.com
 

No comments:

Post a Comment