Secunia Security Advisory - Ubuntu has isssued an update for gnupg. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.
83a6faec8f92a409b9cda73ec8e8c422d811e1d0e33f68dea1095147923faf00
----------------------------------------------------------------------
To improve our services to our customers, we have made a number of
additions to the Secunia Advisories and have started translating the
advisories to German.
The improvements will help our customers to get a better
understanding of how we reached our conclusions, how it was rated,
our thoughts on exploitation, attack vectors, and scenarios.
This includes:
* Reason for rating
* Extended description
* Extended solution
* Exploit code or links to exploit code
* Deep links
Read the full description:
https://corporate.secunia.com/products/48/?r=l
Contact Secunia Sales for more information:
https://corporate.secunia.com/how_to_buy/15/?r=l
----------------------------------------------------------------------
TITLE:
Ubuntu update for gnupg
SECUNIA ADVISORY ID:
SA23110
VERIFY ADVISORY:
https://secunia.com/advisories/23110/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
Ubuntu Linux 6.06
https://secunia.com/product/10611/
Ubuntu Linux 5.10
https://secunia.com/product/6606/
Ubuntu Linux 6.10
https://secunia.com/product/12470/
DESCRIPTION:
Ubuntu has isssued an update for gnupg. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise
a user's system.
For more information:
SA23094
SOLUTION:
Apply updated packages.
-- Ubuntu 5.10 --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5.diff.gz
Size/MD5: 21914 9c398c7ad981984ce7e2d5c73d39646c
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5.dsc
Size/MD5: 684 99674acf9842bede50bfc9cee94233bc
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1.orig.tar.gz
Size/MD5: 4059170 1cc77c6943baaa711222e954bbd785e5
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_amd64.deb
Size/MD5: 1136516 6f95cee543adea0d34af0db0270e8301
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_amd64.udeb
Size/MD5: 152280 91e6fec1a7cac200e6607a5aca8e283c
i386 architecture (x86 compatible Intel/AMD)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_i386.deb
Size/MD5: 1044704 511314c5de795b3f732fbc48fa9bc245
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_i386.udeb
Size/MD5: 130672 c2af84edf925cf93e92df0afd1747a8b
powerpc architecture (Apple Macintosh G3/G4/G5)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_powerpc.deb
Size/MD5: 1119908 d942ad0abd5921bb771fd6180d32f28b
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_powerpc.udeb
Size/MD5: 140214 ac880f5f3a32fe0bba76d61ef5374f61
sparc architecture (Sun SPARC/UltraSPARC)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.1-1ubuntu1.5_sparc.deb
Size/MD5: 1064488 49125a2b181ce9e4ca22b67b6712b153
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.1-1ubuntu1.5_sparc.udeb
Size/MD5: 139606 f97c2b5b2f406afb0cc8478df8529a1c
-- Ubuntu 6.06 LTS --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3.diff.gz
Size/MD5: 20808 4208a73338b5624d39f355e553927548
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3.dsc
Size/MD5: 690 858b47da7b535136aa99ab7ccbd2aaef
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2.orig.tar.gz
Size/MD5: 4222685 50d8fd9c5715ff78b7db0e5f20d08550
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_amd64.deb
Size/MD5: 1066374 7e03df9183620a5c23db7caefb3f5b2b
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_amd64.udeb
Size/MD5: 140312 9384b3aa9a950db2bb80ad20f820529c
i386 architecture (x86 compatible Intel/AMD)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_i386.deb
Size/MD5: 981392 75eba5633769eb5c8e4fbd863d0ffed9
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_i386.udeb
Size/MD5: 120284 5ab02d409b4b475657f5c52081d3ccf9
powerpc architecture (Apple Macintosh G3/G4/G5)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_powerpc.deb
Size/MD5: 1053850 43d575debcff4457419d48f78d164449
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_powerpc.udeb
Size/MD5: 130154 9491f62000cc12df6f23b8d66fd97859
sparc architecture (Sun SPARC/UltraSPARC)
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.2.2-1ubuntu2.3_sparc.deb
Size/MD5: 994040 09848e3252cae2efeefeef913e4ef9d5
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.2.2-1ubuntu2.3_sparc.udeb
Size/MD5: 127412 56d3912d3002bf3f0377a6437a6f851c
-- Ubuntu 6.10 --
Source archives:
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1.diff.gz
Size/MD5: 25822 be04724ca7e6d4dcf2a016ebe2d4bd25
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1.dsc
Size/MD5: 697 446e892916ea052627a78152037651d9
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3.orig.tar.gz
Size/MD5: 4320394 fcdf572a33dd037653707b128dd150a7
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
https://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_amd64.udeb
Size/MD5: 379748 635660a16621f2d7cc752e61cf926208
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_amd64.deb
Size/MD5: 1112036 daa0230d7072a2b25996d5ef387d5312
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_amd64.udeb
Size/MD5: 142628 db13e0940956c59d2efd2467e30dd27c
i386 architecture (x86 compatible Intel/AMD)
https://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_i386.udeb
Size/MD5: 357538 0cfa39e8bf18bd48991298bc01a733ec
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_i386.deb
Size/MD5: 1055538 67ba9574b18247de52f32ba976d941ef
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_i386.udeb
Size/MD5: 129146 1fb42163be150d7fa7b73dfcbfbcb244
powerpc architecture (Apple Macintosh G3/G4/G5)
https://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_powerpc.udeb
Size/MD5: 372472 f2b7b44029ff56d7911590d4285be8bd
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_powerpc.deb
Size/MD5: 1107214 8ac1d1de40130c0b61334fde37692c9b
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_powerpc.udeb
Size/MD5: 136288 023825eced954075f8e3443a227a5aa3
sparc architecture (Sun SPARC/UltraSPARC)
https://security.ubuntu.com/ubuntu/pool/universe/g/gnupg/gnupg-udeb_1.4.3-2ubuntu3.1_sparc.udeb
Size/MD5: 366138 d98c8c252f725be2895a99a2f1ffd23d
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gnupg_1.4.3-2ubuntu3.1_sparc.deb
Size/MD5: 1042190 01e8b454133f351081d6fab5fdea0443
https://security.ubuntu.com/ubuntu/pool/main/g/gnupg/gpgv-udeb_1.4.3-2ubuntu3.1_sparc.udeb
Size/MD5: 132764 d961891ab18f423819b766f3ce670e39
ORIGINAL ADVISORY:
https://www.ubuntu.com/usn/usn-389-1
OTHER REFERENCES:
SA23094:
https://secunia.com/advisories/23094/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------