Bug 218505

Summary: CVE-2006-6169 GnuPG heap overflow
Product: Red Hat Enterprise Linux 4 Reporter: Lubomir Kundrak <lkundrak>
Component: gnupgAssignee: Nalin Dahyabhai <nalin>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: 4.4Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: https://bugs.g10code.com/gnupg/issue728
Whiteboard: impact=low,reported=20061128,source=gnupg,public=20061124
Fixed In Version: RHSA-2006-0754 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-12-06 17:54:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 218506    

Description Lubomir Kundrak 2006-12-05 19:36:19 UTC
Description of problem:

If make_printable_string() returns a string longer than one given as an
argument, a heap-based buffer overflow occurs in openfile.c:ask_outfile_name()

Version-Release number of selected component (if applicable):

RHEL-2.1, RHEL-3, RHEL-4, RHEL-5, FC-5, FC-6

Comment 4 Red Hat Bugzilla 2006-12-06 17:54:14 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0754.html