[Bug 217950] CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow

bugzilla at redhat.com bugzilla at redhat.com
Fri Dec 1 15:02:29 UTC 2006


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=217950


rdieter at math.unl.edu changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |CLOSED
         Resolution|                            |NEXTRELEASE




------- Additional Comments From rdieter at math.unl.edu  2006-12-01 10:02 EST -------
Okey dokie, builds queue'd for remaining vulnerable releases:

FC-6+:
* Wed Nov 29 2006 Rex Dieter <rexdieter[AT]users.sf.net> 2.0.1-1
- gnupg-2.0.1
- CVE-2006-6169 (bug #217950)

FC-3/4/5:
* Fri Dec 01 2006 Rex Dieter <rexdieter[AT]users.sf.net> 1.9.22-8
- CVE-2006-6169 (bug #217950)
- --disable-optmization on 64bit archs

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the security mailing list