Bug 217950 - (CVE-2006-6169) CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow
CVE-2006-6169: gnupg2 < 2.0.1 buffer overflow
Product: Fedora
Classification: Fedora
Component: gnupg2 (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Rex Dieter
Fedora Extras Quality Assurance
: Security
Depends On:
  Show dependency treegraph
Reported: 2006-11-30 16:08 EST by Ville Skyttä
Modified: 2007-11-30 17:11 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-12-01 10:02:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Ville Skyttä 2006-11-30 16:08:47 EST

"Buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg)
1.4 and 2.0, when running interactively, might allow attackers to execute
arbitrary code via messages that cause the make_printable_string function to
return a longer string than expected while constructing a prompt."

FE[3456] seem affected, devel looks ok.
Comment 1 Rex Dieter 2006-11-30 16:19:27 EST
Yucky. FC-6+ should already be fine.  Older releases need patching.
Comment 2 Ville Skyttä 2006-11-30 17:13:55 EST
Unless I'm missing something, the upstream fix is not in FE6's 2.0.1rc1, but
only in devel's 2.0.1 final.
Comment 3 Rex Dieter 2006-12-01 07:40:37 EST
OK, though that's contrary to what the dev's said on the gpg-dev mailing list, I
was planning on upgrading FC-6 to 2.0.1 final asap anyway.
Comment 4 Rex Dieter 2006-12-01 10:02:17 EST
Okey dokie, builds queue'd for remaining vulnerable releases:

* Wed Nov 29 2006 Rex Dieter <rexdieter[AT]users.sf.net> 2.0.1-1
- gnupg-2.0.1
- CVE-2006-6169 (bug #217950)

* Fri Dec 01 2006 Rex Dieter <rexdieter[AT]users.sf.net> 1.9.22-8
- CVE-2006-6169 (bug #217950)
- --disable-optmization on 64bit archs

Note You need to log in before you can comment on or make changes to this bug.