Summary: | app-crypt/gnupg: improper signature verification [CVE-2006-0455] | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tavis Ormandy (RETIRED) <taviso> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | crypto+disabled, schaedpq |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html | ||
Whiteboard: | B3? [glsa] DerCorny | ||
Package list: | Runtime testing required: | --- |
Description
Tavis Ormandy (RETIRED)
![]() I've noticed a fix was committed for this issue to svn, so we can unrestrict this bug now. Werner: in your opinion, does this bug warrant an update? GnuPG project has released 1.4.2.1 to address this issue, moving into vulnerabilities. Crypto herd: please provide updated ebuilds. Done. arches please test and mark stable, thanks amd64 stable ppc stable stable on ppc64 x86 done SPARC'd Stable on hppa Stable on alpha + ia64. ok, glsa vote i guess. I vote YES. Yes too, GLSA draft is in and ready. GLSA 200602-10 arm mips and s390 should remember to mark stable to benefit from GLSA mips stable. |