|
|
Log in / Subscribe / Register

gnupg: integer overflow

Package(s):gnupg CVE #(s):CVE-2006-3746
Created:August 3, 2006 Updated:August 15, 2006
Description: GnuPG has an integer overflow vulnerability. An attacker can create an overly long packet that can cause GnuPG to crash or possibly overwrite memory, causing a denial of service or possible code execution.
Alerts:
Mandriva MDKSA-2006:141 gnupg 2006-08-14
SuSE SUSE-SR:2006:020 gpg, krb5, ncompress, ethereal 2006-08-14
Gentoo 200608-08:02 gnupg 2006-08-05
Gentoo 200608-08 gnupg 2006-08-05
Trustix TSLSA-2006-0044 apache, gnupg, libtiff 2006-08-04
Debian DSA-1141-1 gnupg2 2006-08-04
Fedora FEDORA-2006-868 gnupg 2006-08-04
Fedora FEDORA-2006-867 gnupg 2006-08-04
Debian DSA-1140-1 gnupg 2006-08-03
Ubuntu USN-332-1 gnupg 2006-08-03
Slackware SSA:2006-215-01 gnupg 2006-08-03
rPath rPSA-2006-0143-1 gnupg 2006-08-02
Red Hat RHSA-2006:0615-01 GnuPG 2006-08-02

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds