Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=217950
rdieter(a)math.unl.edu changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |CLOSED
Resolution| |NEXTRELEASE
------- Additional Comments From rdieter(a)math.unl.edu 2006-12-01 10:02 EST -------
Okey dokie, builds queue'd for remaining vulnerable releases:
FC-6+:
* Wed Nov 29 2006 Rex Dieter <rexdieter[AT]users.sf.net> 2.0.1-1
- gnupg-2.0.1
- CVE-2006-6169 (bug #217950)
FC-3/4/5:
* Fri Dec 01 2006 Rex Dieter <rexdieter[AT]users.sf.net> 1.9.22-8
- CVE-2006-6169 (bug #217950)
- --disable-optmization on 64bit archs
--
Configure bugmail:
https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.