5 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.896 High
EPSS
Percentile
98.8%
CentOS Errata and Security Advisory CESA-2006:0615
GnuPG is a utility for encrypting data and creating digital signatures.
An integer overflow flaw was found in GnuPG. An attacker could create a
carefully crafted message packet with a large length that could cause GnuPG
to crash or possibly overwrite memory when opened. (CVE-2006-3746)
All users of GnuPG are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2006-August/075268.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075270.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075271.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075273.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075276.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075280.html
https://lists.centos.org/pipermail/centos-announce/2006-August/075281.html
Affected packages:
gnupg
Upstream details at:
https://access.redhat.com/errata/RHSA-2006:0615
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 4 | ia64 | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.ia64.rpm |
CentOS | 4 | alpha | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.alpha.rpm |
CentOS | 3 | ia64 | gnupg | < 1.2.1-17 | gnupg-1.2.1-17.ia64.rpm |
CentOS | 4 | s390 | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.s390.rpm |
CentOS | 4 | s390x | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.s390x.rpm |
CentOS | 3 | s390 | gnupg | < 1.2.1-17 | gnupg-1.2.1-17.s390.rpm |
CentOS | 3 | s390x | gnupg | < 1.2.1-17 | gnupg-1.2.1-17.s390x.rpm |
CentOS | 4 | x86_64 | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.x86_64.rpm |
CentOS | 4 | i386 | gnupg | < 1.2.6-6 | gnupg-1.2.6-6.i386.rpm |