CVE-2014-3564

Publication date 1 August 2014

Last updated 24 July 2024


Ubuntu priority

Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."

Status

Package Ubuntu Release Status
gpgme1.0 14.04 LTS trusty
Fixed 1.4.3-0.1ubuntu5.1
12.04 LTS precise
Fixed 1.2.0-1.4ubuntu2.1
10.04 LTS lucid
Fixed 1.2.0-1.2ubuntu1.1

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gpgme1.0

References

Related Ubuntu Security Notices (USN)

Other references