TITLE: SUSE update for gpg SECUNIA ADVISORY ID: SA19197 VERIFY ADVISORY: http://secunia.com/advisories/19197/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10 http://secunia.com/product/6221/ SuSE Linux 9.1 http://secunia.com/product/3473/ SUSE Linux 9.2 http://secunia.com/product/4258/ SUSE Linux 9.3 http://secunia.com/product/4933/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ UnitedLinux 1.0 http://secunia.com/product/2003/ DESCRIPTION: SUSE has issued an update for gpg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. For more information: SA19173 SOLUTION: Apply updated packages. -- x86 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/gpg-1.4.2-5.4.i586.rpm 17f4db7313fb81477d491cd1de3b4a7c SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/gpg-1.4.0-4.4.i586.rpm 781a1f6ee507960c3b7f5ab7b09aae01 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/gpg-1.2.5-3.6.i586.rpm 0ac37c5097314b9d65fe3c00552991ba SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/gpg-1.2.4-68.13.i586.rpm 2436ccc119ac1af98928536d2b968a3a -- Power PC Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/gpg-1.4.2-5.4.ppc.rpm 7da97d12baf4aa28e307affa9ccaa2ad -- x86-64 Platform -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/gpg-1.4.2-5.4.x86_64.rpm 490728e89c6564ac1e0b679012a89a42 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/gpg-1.4.0-4.4.x86_64.rpm f258e8971ef2eb171907bbc426e15893 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/gpg-1.2.5-3.6.x86_64.rpm 3e59895b7bed858997bdbc49aece5644 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/gpg-1.2.4-68.13.x86_64.rpm 6369420f068f5d935bbc01f4798f2f20 -- Sources -- SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/gpg-1.4.2-5.4.src.rpm a4ee567384c8744bafc59c19ed89669e SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/gpg-1.4.0-4.4.src.rpm 2d392b6698c4a9bb5f2b54aa51b53405 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/gpg-1.2.5-3.6.src.rpm 1cb53598e1a3c6d31aefc69c2ea18f37 SUSE LINUX 9.1: ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/gpg-1.2.4-68.13.src.rpm 91f82734783f307bf64a1728dbcddd79 ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/gpg-1.2.4-68.13.src.rpm 117ec3bfb057b88b637355db64c74723 ORIGINAL ADVISORY: http://lists.suse.de/archive/suse-security-announce/2006-Mar/0003.html OTHER REFERENCES: SA19173: http://secunia.com/advisories/19173/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------