Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Linux-Mandrake Security Update Advisory: gnupg

May 31, 2001, 16:12 (0 Talkback[s])
From: Linux Mandrake Security Team <security@linux-mandrake.com>
Subject: MDKSA-2001:053 - gnupg update
Date: Wed, 30 May 2001 20:10:48 -0600

______________________________________________________________________

                Linux-Mandrake Security Update Advisory
______________________________________________________________________

Package name:           gnupg
Date:                   May 30th, 2001
Advisory ID:            MDKSA-2001:053

Affected versions:      7.1, 7.2, 8.0, Corporate Server 1.0.1
______________________________________________________________________

Problem Description:

 A format string vulnerability exists in gnupg 1.0.5 and previous
 versions which is fixed in 1.0.6.  This vulnerability can be used to
 invoke shell commands with privileges of the currently logged-in user.
______________________________________________________________________

References:

 http://archives.indenial.com/hypermail/bugtraq/2001/May2001/0275.html
______________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
  http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.1:
6bce2d70a906e30605fa021e6d987f61  7.1/RPMS/gnupg-1.0.6-1.2mdk.i586.rpm
25735e364ecdff216d7b2bbfa1ef17fd  7.1/SRPMS/gnupg-1.0.6-1.2mdk.src.rpm

Linux-Mandrake 7.2:
cab7e68386a371f4f0ae8734f5601900  7.2/RPMS/gnupg-1.0.6-1.1mdk.i586.rpm
fe11e9355dd81b4840bc495c640984a6  7.2/SRPMS/gnupg-1.0.6-1.1mdk.src.rpm

Linux-Mandrake 8.0:
6a7527d8f95f6d45a0f6af6aa42f3661  8.0/RPMS/gnupg-1.0.6-1.1mdk.i586.rpm
fe11e9355dd81b4840bc495c640984a6  8.0/SRPMS/gnupg-1.0.6-1.1mdk.src.rpm

Corporate Server 1.0.1:
6bce2d70a906e30605fa021e6d987f61  1.0.1/RPMS/gnupg-1.0.6-1.2mdk.i586.rpm
25735e364ecdff216d7b2bbfa1ef17fd  1.0.1/SRPMS/gnupg-1.0.6-1.2mdk.src.rpm
______________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

______________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:

  http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Linux-Mandrake 8.0, look for it in "updates/8.0/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other security advisories for Linux-Mandrake at:

  http://www.linux-mandrake.com/en/security/

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
______________________________________________________________________

Linux-Mandrake has two security-related mailing list services that
anyone can subscribe to:

security-announce@linux-mandrake.com

  Linux-Mandrake's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.

security-discuss@linux-mandrake.com

  Linux-Mandrake's security discussion mailing list.  This list is open
  to anyone to discuss Linux-Mandrake security specifically and Linux
  security in general.

To subscribe to either list, send a message to
  sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
  sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
  sympa@linux-mandrake.com
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:

  http://www.linux-mandrake.com/en/flists.php3#security