Pufferüberlauf in gnupg
ID: | MDKSA-2001:053 |
Distribution: | Mandrake |
Plattformen: | Mandrake 7.1, Mandrake 7.2, Mandrake Corporate Server 1.0.1, Mandrake 8.0 |
Datum: | Do, 31. Mai 2001, 13:00 |
Referenzen: | Keine Angabe |
Applikationen: | The GNU Privacy Guard |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Linux-Mandrake Security Update Advisory ________________________________________________________________________ Package name: gnupg Date: May 30th, 2001 Advisory ID: MDKSA-2001:053 Affected versions: 7.1, 7.2, 8.0, Corporate Server 1.0.1 ________________________________________________________________________ Problem Description: A format string vulnerability exists in gnupg 1.0.5 and previous versions which is fixed in 1.0.6. This vulnerability can be used to invoke shell commands with privileges of the currently logged-in user. ________________________________________________________________________ References: http://archives.indenial.com/hypermail/bugtraq/2001/May2001/0275.html ________________________________________________________________________ Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Linux-Mandrake Security Team at http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Linux-Mandrake 7.1: 6bce2d70a906e30605fa021e6d987f61 7.1/RPMS/gnupg-1.0.6-1.2mdk.i586.rpm 25735e364ecdff216d7b2bbfa1ef17fd 7.1/SRPMS/gnupg-1.0.6-1.2mdk.src.rpm Linux-Mandrake 7.2: cab7e68386a371f4f0ae8734f5601900 7.2/RPMS/gnupg-1.0.6-1.1mdk.i586.rpm fe11e9355dd81b4840bc495c640984a6 7.2/SRPMS/gnupg-1.0.6-1.1mdk.src.rpm Linux-Mandrake 8.0: 6a7527d8f95f6d45a0f6af6aa42f3661 8.0/RPMS/gnupg-1.0.6-1.1mdk.i586.rpm fe11e9355dd81b4840bc495c640984a6 8.0/SRPMS/gnupg-1.0.6-1.1mdk.src.rpm Corporate Server 1.0.1: 6bce2d70a906e30605fa021e6d987f61 1.0.1/RPMS/gnupg-1.0.6-1.2mdk.i586.rpm 25735e364ecdff216d7b2bbfa1ef17fd 1.0.1/SRPMS/gnupg-1.0.6-1.2mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". You can download the updates directly from one of the mirror sites listed at: http://www.linux-mandrake.com/en/ftp.php3. Updated packages are available in the "updates/[ver]/RPMS/" directory. For example, if you are looking for an updated RPM package for Linux-Mandrake 8.0, look for it in "updates/8.0/RPMS/". Updated source RPMs are available as well, but you generally do not need to download them. Please be aware that sometimes it takes the mirrors a few hours to update. You can view other security advisories for Linux-Mandrake at: http://www.linux-mandrake.com/en/security/ If you want to report vulnerabilities, please contact security@linux-mandrake.com ________________________________________________________________________ Linux-Mandrake has two security-related mailing list services that anyone can subscribe to: security-announce@linux-mandrake.com Linux-Mandrake's security announcements mailing list. Only announcements are sent to this list and it is read-only. security-discuss@linux-mandrake.com Linux-Mandrake's security discussion mailing list. This list is open to anyone to discuss Linux-Mandrake security specifically and Linux security in general. To subscribe to either list, send a message to sympa@linux-mandrake.com with "subscribe [listname]" in the body of the message. To remove yourself from either list, send a message to sympa@linux-mandrake.com with "unsubscribe [listname]" in the body of the message. To get more information on either list, send a message to sympa@linux-mandrake.com with "info [listname]" in the body of the message. Optionally, you can use the web interface to subscribe to or unsubscribe from either list: http://www.linux-mandrake.com/en/flists.php3#security ________________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team |