[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HPX6N-0006P9-5b@artemis.annvix.ca>
Date: Thu, 08 Mar 2007 21:53:11 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:059 ] - Updated gnupg packages
provide enhanced forgery detection
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:059
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gnupg
Date : March 8, 2007
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________
Problem Description:
GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components. This could allow a remote
attacker to forge the contents of an email message without detection.
GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2006.0:
ec697754fca080fa53c6c486cd91ba8c 2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm
f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
845bfd1f359b7866e73ab2eb8b30b8fe 2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm
f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm
Mandriva Linux 2007.0:
c1b40e8866482c368aab5df228093ab3 2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm
9dbf1a7a48aecb2ece048b47f4c7ade9 2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm
3809f32ed3708606e6318fb7feed230d 2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm
62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
d5339dd2bc4146dd18c2ab3b4eca028d 2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm
608bd0a86d6f83927466f23e7d73fa8d 2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm
915d2d203fa41ce12bc661d1a89d563b 2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm
62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm
31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm
Corporate 3.0:
36afcf2ffb12348fccdfba01b485d7fc corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm
ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm
Corporate 3.0/X86_64:
250e2ef0d26f6d51aa175e32c04e29d0 corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm
ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm
Corporate 4.0:
e39b79ee6122b17eaefa4abb7eec8d05 corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm
16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
810b054fed4d7c0b2c8605bb7c3efdca corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm
16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
014a4338ad09dca79149509a1a0a2050 mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm
d513a1498ccd2ee5661fb6a9e80c5230 mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFF8LvpmqjQ0CJFipgRAk5yAJ4mihFJrRV8cInt9tK3IOogC6wB3gCgjW0c
eMLhgVvm4msQrd936ApOrYE=
=vufo
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists