Summary: | app-crypt/gnupg 1.4 and 2.0 buffer overflow (CVE-2006-6169) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Rajiv Aaron Manglani (RETIRED) <rajiv> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | crypto+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Other | ||
URL: | https://bugs.g10code.com/gnupg/issue728 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Rajiv Aaron Manglani (RETIRED)
![]() and if you read the rest of the announcements on the relevant mailing lists, 1.4.6/2.0.1 will be out in a day or two to resolve this. doesnt seem like a security issue, unless you can get someone to type in lots of (partially binary) characters. Can anyone think of an attack using this bug? where exactly do you have to type something? As I currently understand it, this can be triggered by interactively runnung gpg on a malicious file (like the one the reported attached to the upstream bug) - but I had no deep look here, since the vendor came out with this (and well, I seriously hope that they know what they are doing). Ahh, I see what you mean, I hadnt read the bug. Yes, this looks like it would be a problem then, ignore my last comment. upstream has 2.0.1 out, but not 1.4.6 yet. has not been fully wrangled so far... rating B2... just to fill this comment field... gnupg 1.4.6 is now available at http://www.gnupg.org/download/ Done. Please don't close Security bugs. This one is ready for GLSA. GLSA 200612-03 |