---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: SUSE update for gnupg SECUNIA ADVISORY ID: SA23284 VERIFY ADVISORY: http://secunia.com/advisories/23284/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10 http://secunia.com/product/6221/ SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 9.3 http://secunia.com/product/4933/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SuSE Linux Openexchange Server 4.x http://secunia.com/product/2001/ SuSE Linux Standard Server 8 http://secunia.com/product/2526/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ UnitedLinux 1.0 http://secunia.com/product/2003/ SOFTWARE: Novell Open Enterprise Server http://secunia.com/product/4664/ DESCRIPTION: SUSE has issued an update for gnupg. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA23094 SA23245 SOLUTION: Apply updated packages. x86 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/gpg-1.4.5-24.2.i586.rpm 0032014cef28fd9d575ca9d56886dc9a ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/gpg2-1.9.22-20.2.i586.rpm 8cdf17f4928497c703df0986012bd924 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/gpg-1.4.2-23.12.i586.rpm 714ad111277495f85fb4d75c07a436e1 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/gpg2-1.9.18-17.13.i586.rpm df328ffaa0b0fa34e70932dd8eafd399 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/gpg-1.4.2-5.11.i586.rpm bbdac2ac9cf42f2e0744f93c7a27bd64 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/gpg2-1.9.18-2.11.i586.rpm 6b96bf0aa835b5c5a6d38f3fe9baa020 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/gpg-1.4.0-4.11.i586.rpm 1f188d6e98593753dbf0115758c60700 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/gpg2-1.9.14-6.13.i586.rpm 493bb161ab9a0ee7e8b687da49fc874f Power PC Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/gpg-1.4.5-24.2.ppc.rpm 8ba71e773c0ed4bfad10017d4f0ad769 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/gpg2-1.9.22-20.2.ppc.rpm 04e4aa189832a2834ac843d3d216b560 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/gpg-1.4.2-23.12.ppc.rpm 87d3e2efab5fda6d0c0fb0228e8089eb ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/gpg2-1.9.18-17.13.ppc.rpm 9ecd1af3d67515388dc5f9c797d33fde SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/gpg-1.4.2-5.11.ppc.rpm 36dd086f17d69a2344387249f4f59828 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/gpg2-1.9.18-2.11.ppc.rpm 0b0a3f42511f722f1113ceb2ddb1fe42 x86-64 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/gpg-1.4.5-24.2.x86_64.rpm 178ec43c6b057b055e64fd8ce3b370f3 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/gpg2-1.9.22-20.2.x86_64.rpm a480e34bc72c13902b060774a8c93614 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/gpg-1.4.2-23.12.x86_64.rpm 424104d7e79aa13997a9cd5bf48daaed ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/gpg2-1.9.18-17.13.x86_64.rpm f9813d58d65585d3216ce4a514288e60 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/gpg-1.4.2-5.11.x86_64.rpm 542621ad20461324061e95d757f062a9 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/gpg2-1.9.18-2.11.x86_64.rpm 6e40568843721500e6e7a01e49478be5 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/gpg-1.4.0-4.11.x86_64.rpm d0857cd1ef3d71961e866f56c565b32d ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/gpg2-1.9.14-6.13.x86_64.rpm 20eb29a34cd71e5d1fa86bb53522a5ca Sources: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/gpg-1.4.5-24.2.src.rpm 8b319a4138cc1ff4304dc45c369936c6 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/gpg2-1.9.22-20.2.src.rpm 6ea5c120e635118233a97c5877ca10c0 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/gpg-1.4.2-23.12.src.rpm 551331ff3994d1e0a6a1c893f9d99c84 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/gpg2-1.9.18-17.13.src.rpm 4dcf00273942790ccc8945f1badb441d SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/gpg-1.4.2-5.11.src.rpm 47425c0af8df3d11100bc938db0d9141 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/gpg2-1.9.18-2.11.src.rpm d76d488c78aa5c047f9d0d3a72bb1509 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/gpg-1.4.0-4.11.src.rpm 86c9afba71507f0d4f3f7e88fa599ea1 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/gpg2-1.9.14-6.13.src.rpm a911124ed914970d7c458caf03ddd709 UnitedLinux 1.0 SuSE Linux Openexchange Server 4 Open Enterprise Server Novell Linux POS 9 SuSE Linux Enterprise Server 8 SuSE Linux Standard Server 8 SuSE Linux School Server SUSE LINUX Retail Solution 8 SuSE Linux Desktop 1.0 SUSE SLES 9 http://support.novell.com/techcenter/psdb/440643b5b7f99c513f043f911ca9d906.html Novell Linux Desktop 9 SUSE SLES 10 SUSE SLED 10 http://support.novell.com/techcenter/psdb/440643b5b7f99c513f043f911ca9d906.html http://support.novell.com/techcenter/psdb/d29d6e06422f5a6d9e87580b666bbb83.html ORIGINAL ADVISORY: http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html OTHER REFERENCES: SA23094: http://secunia.com/advisories/23094/ SA23245: http://secunia.com/advisories/23245/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------