Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report. Summary: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=217950 rdieter@xxxxxxxxxxxx changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |CLOSED Resolution| |NEXTRELEASE ------- Additional Comments From rdieter@xxxxxxxxxxxx 2006-12-01 10:02 EST ------- Okey dokie, builds queue'd for remaining vulnerable releases: FC-6+: * Wed Nov 29 2006 Rex Dieter <rexdieter[AT]users.sf.net> 2.0.1-1 - gnupg-2.0.1 - CVE-2006-6169 (bug #217950) FC-3/4/5: * Fri Dec 01 2006 Rex Dieter <rexdieter[AT]users.sf.net> 1.9.22-8 - CVE-2006-6169 (bug #217950) - --disable-optmization on 64bit archs -- Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is. -- Fedora-security-list mailing list Fedora-security-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-security-list