---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Debian update for gnupg SECUNIA ADVISORY ID: SA23299 VERIFY ADVISORY: http://secunia.com/advisories/23299/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ DESCRIPTION: Debian has issued an update for gnupg. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA23094 SA23245 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.1 alias sarge -- Source archives: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6.dsc Size/MD5 checksum: 680 f99d9936fdb3d87b37f719d4f507702a http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6.diff.gz Size/MD5 checksum: 22889 219b13435d4594c530614638590b65d3 http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1.orig.tar.gz Size/MD5 checksum: 4059170 1cc77c6943baaa711222e954bbd785e5 Alpha architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_alpha.deb Size/MD5 checksum: 2156230 950520b2391eb6444593c66a8e96d6c3 AMD64 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_amd64.deb Size/MD5 checksum: 1963738 589ab9ab433e000e919a38f558f54f5e ARM architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_arm.deb Size/MD5 checksum: 1899822 158ed8fe21da9e2b8c730b3b2acce9a8 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_hppa.deb Size/MD5 checksum: 2004374 9daff80c38cf65bb299fb5ee370d44d6 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_i386.deb Size/MD5 checksum: 1909194 8752d3578b55a7fd1535bba18ca0770c Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_ia64.deb Size/MD5 checksum: 2325806 38fa7bb8def3d1a296aa6aa3432561a3 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_m68k.deb Size/MD5 checksum: 1811222 f51182d8badb7c2b0ef42b78c71be16d Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_mips.deb Size/MD5 checksum: 2001184 cc087abacd572bed64a2ab191d863946 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_mipsel.deb Size/MD5 checksum: 2007888 c42342dd898361ed9fcee1bdc8edc3e2 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_powerpc.deb Size/MD5 checksum: 1958036 ff8ee1d008561ce87732847e895024ec IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_s390.deb Size/MD5 checksum: 1967406 693212d3c1b12bf7f6f204daa0531f6a Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gnupg/gnupg_1.4.1-1.sarge6_sparc.deb Size/MD5 checksum: 1897740 3821e5e9e69241324d781fe78ed1ace7 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.4.6-1. ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1231 OTHER REFERENCES: SA23094: http://secunia.com/advisories/23094/ SA23245: http://secunia.com/advisories/23245/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------