Package: gnupg2 Version: 2.0.8-1 Severity: grave Tags: security Justification: user security hole
http://www.ocert.org/advisories/ocert-2008-1.html It's fixed in 2.0.9, Sarge and Etch are not affected. There's no CVE yet. Cheers, Moritz -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core) Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Shell: /bin/sh linked to /bin/bash Versions of packages gnupg2 depends on: ii libbz2-1.0 1.0.5-0.1 high-quality block-sorting file co ii libc6 2.7-9 GNU C Library: Shared libraries ii libcurl3-gnutls 7.18.0-1 Multi-protocol file transfer libra ii libgcrypt11 1.4.0-3 LGPL Crypto library - runtime libr ii libgpg-error0 1.4-2 library for common error values an ii libkrb53 1.6.dfsg.3~beta1-4 MIT Kerberos runtime libraries ii libksba8 1.0.3-1 X.509 and CMS support library ii libreadline5 5.2-3 GNU readline and history libraries ii zlib1g 1:1.2.3.3.dfsg-11 compression library - runtime Versions of packages gnupg2 recommends: ii libldap2 2.1.30.dfsg-13.5 OpenLDAP libraries -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]