TITLE: Mandriva update for gnupg SECUNIA ADVISORY ID: SA18942 VERIFY ADVISORY: http://secunia.com/advisories/18942/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ Mandrake Corporate Server 2.x http://secunia.com/product/1222/ DESCRIPTION: Mandriva has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. For more information: SA18845 SOLUTION: Apply updated packages. Mandrakelinux 10.1 5d18d12ad040377708e5b76397edea3d 10.1/RPMS/gnupg-1.2.4-1.2.101mdk.i586.rpm d60929578b66abf129fe774abcb3365b 10.1/SRPMS/gnupg-1.2.4-1.2.101mdk.src.rpm Mandrakelinux 10.1/X86_64 3f3cff6c5a6fb9a5abe815c8e2e22774 x86_64/10.1/RPMS/gnupg-1.2.4-1.2.101mdk.x86_64.rpm d60929578b66abf129fe774abcb3365b x86_64/10.1/SRPMS/gnupg-1.2.4-1.2.101mdk.src.rpm Corporate Server 2.1 4c6841d5f28eddf14dc142cbd7e922e1 corporate/2.1/RPMS/gnupg-1.0.7-3.4.C21mdk.i586.rpm 0976dbd29fece66598e4cec6e6753071 corporate/2.1/SRPMS/gnupg-1.0.7-3.4.C21mdk.src.rpm Corporate Server 2.1/X86_64 43023e526548b3311c8a38952fd563a9 x86_64/corporate/2.1/RPMS/gnupg-1.0.7-3.4.C21mdk.x86_64.rpm 0976dbd29fece66598e4cec6e6753071 x86_64/corporate/2.1/SRPMS/gnupg-1.0.7-3.4.C21mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:043 OTHER REFERENCES: SA18845: http://secunia.com/advisories/18845/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------