Gentoo: kopte arbitrary code execution vulnerability
Summary
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-03
The GnuPG plugin in kopete before 0.6.2 does not properly cleanse the command line when executing gpg, which allows remote attackers to execute arbitrary commands.
SOLUTION
It is recommended that all Gentoo Linux users who are running net-im/kopete upgrade to kopete-0.6.2 as follows:
emerge sync emerge kopete emerge clean
aliz@gentoo.org - GnuPG key is available at
Resolution
References
Availability
Concerns
Background