lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HPX6N-0006P5-3U@artemis.annvix.ca>
Date: Thu, 08 Mar 2007 21:53:11 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:059 ] - Updated gnupg packages provide enhanced forgery detection


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:059
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : gnupg
 Date    : March 8, 2007
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
 command
 line, did not visually distinguish signed and unsigned portions of
 OpenPGP messages with multiple components.  This could allow a remote
 attacker to forge the contents of an email message without detection.
 
 GnuPG 1.4.7 is being provided with this update and GPGME has been
 patched on Mandriva 2007.0 to provide better visual notification on
 these types of forgeries.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 ec697754fca080fa53c6c486cd91ba8c  2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm 
 f30ab12655598264c10cee92ed76c951  2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 845bfd1f359b7866e73ab2eb8b30b8fe  2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm 
 f30ab12655598264c10cee92ed76c951  2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 c1b40e8866482c368aab5df228093ab3  2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm
 9dbf1a7a48aecb2ece048b47f4c7ade9  2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm
 3809f32ed3708606e6318fb7feed230d  2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm 
 62d991ccd15ca77ed37ccd4ca1bedba7  2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
 31357e977acd83d777df2d77c22094f6  2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 d5339dd2bc4146dd18c2ab3b4eca028d  2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm
 608bd0a86d6f83927466f23e7d73fa8d  2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm
 915d2d203fa41ce12bc661d1a89d563b  2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm 
 62d991ccd15ca77ed37ccd4ca1bedba7  2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
 31357e977acd83d777df2d77c22094f6  2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm

 Corporate 3.0:
 36afcf2ffb12348fccdfba01b485d7fc  corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm 
 ec3c9d7bf56e941e2f92a92caa8ac812  corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 250e2ef0d26f6d51aa175e32c04e29d0  corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm 
 ec3c9d7bf56e941e2f92a92caa8ac812  corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm

 Corporate 4.0:
 e39b79ee6122b17eaefa4abb7eec8d05  corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm 
 16926c5d72457c65d89124c1ebd7d0b9  corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 810b054fed4d7c0b2c8605bb7c3efdca  corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm 
 16926c5d72457c65d89124c1ebd7d0b9  corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 014a4338ad09dca79149509a1a0a2050  mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm 
 d513a1498ccd2ee5661fb6a9e80c5230  mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFF8LvpmqjQ0CJFipgRAk5yAJ4mihFJrRV8cInt9tK3IOogC6wB3gCgjW0c
eMLhgVvm4msQrd936ApOrYE=
=vufo
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ