[Bug 217950] New: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow

bugzilla at redhat.com bugzilla at redhat.com
Thu Nov 30 21:08:59 UTC 2006


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=217950

           Summary: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow
           Product: Fedora Extras
           Version: fc6
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: normal
         Component: gnupg2
        AssignedTo: rdieter at math.unl.edu
        ReportedBy: ville.skytta at iki.fi
         QAContact: extras-qa at fedoraproject.org
                CC: extras-qa at fedoraproject.org,fedora-security-
                    list at redhat.com


http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6171

"Buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg)
1.4 and 2.0, when running interactively, might allow attackers to execute
arbitrary code via messages that cause the make_printable_string function to
return a longer string than expected while constructing a prompt."

FE[3456] seem affected, devel looks ok.

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the Fedora-security-list mailing list