Package: gnupg
Version: 1.4.5-3
Severity: grave
Tags: security
Justification: user security hole

According to an email that was sent to the gnupg-announce mailing
list, the version of gnupg in unstable (as well as in stable) is
vulnerable to remote attack.  By introducing a malformed OpenPGP
packet, an attacker can dereference a function pointer in GnuPG which
can be used to control the data processed by GnuPG.  All versions before
1.4.6 are affected, and the recommended fix is to upgrade to 1.4.6.

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-2-amd64
Locale: LANG=C, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages gnupg depends on:
ii  gpgv                         1.4.5-3     GNU privacy guard - signature veri
ii  libbz2-1.0                   1.0.3-6     high-quality block-sorting file co
ii  libc6                        2.3.6.ds1-8 GNU C Library: Shared libraries
ii  libldap2                     2.1.30-13.2 OpenLDAP libraries
ii  libreadline5                 5.2-1       GNU readline and history libraries
ii  libusb-0.1-4                 2:0.1.12-2  userspace USB programming library
ii  makedev                      2.3.1-83    creates device files in /dev
ii  zlib1g                       1:1.2.3-13  compression library - runtime

gnupg recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to