---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Debian update for gnupg SECUNIA ADVISORY ID: SA21333 VERIFY ADVISORY: http://secunia.com/advisories/21333/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA21297 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5.dsc Size/MD5 checksum: 680 3ca752cd4daad97be9a5c39c8946529f http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5.diff.gz Size/MD5 checksum: 20602 60b0f10cc733d5db834cc938ea64c9c6 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Size/MD5 checksum: 4059170 1cc77c6943baaa711222e954bbd785e5 Alpha architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_alpha.deb Size/MD5 checksum: 2155966 7247aeac9ee92201dd653d72250b6635 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_amd64.deb Size/MD5 checksum: 1963522 090bc4edbbcff55a42e0f0e150bebe1c ARM architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_arm.deb Size/MD5 checksum: 1899504 3d5a8c67821576dcb96db83439689693 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_i386.deb Size/MD5 checksum: 1908672 27f9a0178ae75e60f4190f7cc1b648b2 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_ia64.deb Size/MD5 checksum: 2325364 7cb958f11cf26f2606a8630b0837302b HP Precision architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_hppa.deb Size/MD5 checksum: 2004276 0a18314991ba8b9df2197dc59fa9fc9b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_m68k.deb Size/MD5 checksum: 1811104 3d34a165f7e7b9b7f7762ea3f098436a Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_mips.deb Size/MD5 checksum: 2000886 fd5a35eea245eed1d8e867c2dab420fe Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_mipsel.deb Size/MD5 checksum: 2007526 a7d376140cc177b7365b8931e443b511 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_powerpc.deb Size/MD5 checksum: 1957954 405cd2998ce0d4e4867a2b781d023db5 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_s390.deb Size/MD5 checksum: 1967138 4e863993101250029ce2f276a83c964b Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge5_sparc.deb Size/MD5 checksum: 1897516 bce716a627c062c3ca034d8d49c24b58 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.4.5-1. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1140 OTHER REFERENCES: SA21297: http://secunia.com/advisories/21297/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------