[Bug 218821] New: CVE-2006-6235: gnupg2 <= 2.0.1 stack overwrite vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218821

           Summary: CVE-2006-6235: gnupg2 <= 2.0.1 stack overwrite
                    vulnerability
           Product: Fedora Extras
           Version: fc5
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: normal
         Component: gnupg2
        AssignedTo: rdieter@xxxxxxxxxxxx
        ReportedBy: ville.skytta@xxxxxx
         QAContact: extras-qa@xxxxxxxxxxxxxxxxx
                CC: extras-qa@xxxxxxxxxxxxxxxxx,fedora-security-
                    list@xxxxxxxxxx


http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-6235

"A "stack overwrite" vulnerability in GnuPG (gpg) before 1.2.1 allows attackers
to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to
dereference a function pointer from deallocated stack memory."

FC6+ seem to be taken care of already, FC-[345] not yet.

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

--
Fedora-security-list mailing list
Fedora-security-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-security-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Coolkey]

  Powered by Linux