Package: gnupg2
Version: 2.0.8-1
Severity: grave
Tags: security
Justification: user security hole

http://www.ocert.org/advisories/ocert-2008-1.html

It's fixed in 2.0.9, Sarge and Etch are not affected. There's no CVE yet.

Cheers,
        Moritz

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages gnupg2 depends on:
ii  libbz2-1.0            1.0.5-0.1          high-quality block-sorting file co
ii  libc6                 2.7-9              GNU C Library: Shared libraries
ii  libcurl3-gnutls       7.18.0-1           Multi-protocol file transfer libra
ii  libgcrypt11           1.4.0-3            LGPL Crypto library - runtime libr
ii  libgpg-error0         1.4-2              library for common error values an
ii  libkrb53              1.6.dfsg.3~beta1-4 MIT Kerberos runtime libraries
ii  libksba8              1.0.3-1            X.509 and CMS support library
ii  libreadline5          5.2-3              GNU readline and history libraries
ii  zlib1g                1:1.2.3.3.dfsg-11  compression library - runtime

Versions of packages gnupg2 recommends:
ii  libldap2                2.1.30.dfsg-13.5 OpenLDAP libraries

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to