Bug 217950 (CVE-2006-6169)

Summary: CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow
Product: [Other] Security Response Reporter: Ville Skyttä <ville.skytta>
Component: vulnerabilityAssignee: Rex Dieter <rdieter>
Status: CLOSED NEXTRELEASE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: extras-qa, fedora-security-list
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-12-01 15:02:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Ville Skyttä 2006-11-30 21:08:47 UTC

"Buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg)
1.4 and 2.0, when running interactively, might allow attackers to execute
arbitrary code via messages that cause the make_printable_string function to
return a longer string than expected while constructing a prompt."

FE[3456] seem affected, devel looks ok.

Comment 1 Rex Dieter 2006-11-30 21:19:27 UTC
Yucky. FC-6+ should already be fine.  Older releases need patching.

Comment 2 Ville Skyttä 2006-11-30 22:13:55 UTC
Unless I'm missing something, the upstream fix is not in FE6's 2.0.1rc1, but
only in devel's 2.0.1 final.

Comment 3 Rex Dieter 2006-12-01 12:40:37 UTC
OK, though that's contrary to what the dev's said on the gpg-dev mailing list, I
was planning on upgrading FC-6 to 2.0.1 final asap anyway.

Comment 4 Rex Dieter 2006-12-01 15:02:17 UTC
Okey dokie, builds queue'd for remaining vulnerable releases:

* Wed Nov 29 2006 Rex Dieter <rexdieter[AT]users.sf.net> 2.0.1-1
- gnupg-2.0.1
- CVE-2006-6169 (bug #217950)

* Fri Dec 01 2006 Rex Dieter <rexdieter[AT]users.sf.net> 1.9.22-8
- CVE-2006-6169 (bug #217950)
- --disable-optmization on 64bit archs