Package: gnupg
Version: 1.4.1-1.sarge5
Severity: grave
Justification: Introduces security hole
Tags: security, sarge

Hi,

in Sid, CVE-2006-6169 has been fixed with 1.4.5-3, but 1.4.1-1.sarge5
from Sarge is still missing the fix and therefore vulnerable.

Details:

http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
https://bugs.g10code.com/gnupg/issue728
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169
http://packages.qa.debian.org/g/gnupg/news/20061127T220204Z.html

(Thanks to aba for pointing me to the right patch in the Sid
 version. :-)

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.4.33.2-1-dphys-k8-smp-64gb
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages gnupg depends on:
ii  devfsd               1.3.25-19           Daemon for the device file system
ii  libbz2-1.0           1.0.2-7             high-quality block-sorting file co
ii  libc6                2.3.2.ds1-22sarge4  GNU C Library: Shared libraries an
ii  libldap2             2.1.30-8            OpenLDAP libraries
ii  libreadline5         5.0-10              GNU readline and history libraries
ii  libusb-0.1-4         2:0.1.10a-9.sarge.1 userspace USB programming library
ii  makedev              2.3.1-77            creates device files in /dev
ii  zlib1g               1:1.2.2-4.sarge.2   compression library - runtime

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to