|
![]() |
Problem Description |
GnuPG prior to 1.4.7 and GPGME prior to 1.1.4, when run from the
command
line, did not visually distinguish signed and unsigned portions of
OpenPGP messages with multiple components. This could allow a remote
attacker to forge the contents of an email message without detection.
GnuPG 1.4.7 is being provided with this update and GPGME has been
patched on Mandriva 2007.0 to provide better visual notification on
these types of forgeries.
Updated Packages |
Corporate Server 3.0
36afcf2ffb12348fccdfba01b485d7fc corporate/3.0/i586/gnupg-1.4.7-0.2.C30mdk.i586.rpm ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm
Corporate Server 3.0/X86_64
250e2ef0d26f6d51aa175e32c04e29d0 corporate/3.0/x86_64/gnupg-1.4.7-0.2.C30mdk.x86_64.rpm ec3c9d7bf56e941e2f92a92caa8ac812 corporate/3.0/SRPMS/gnupg-1.4.7-0.2.C30mdk.src.rpm
Multi Network Firewall 2.0
014a4338ad09dca79149509a1a0a2050 mnf/2.0/i586/gnupg-1.4.7-0.3.M20mdk.i586.rpm d513a1498ccd2ee5661fb6a9e80c5230 mnf/2.0/SRPMS/gnupg-1.4.7-0.3.M20mdk.src.rpm
Mandriva Linux 2006
ec697754fca080fa53c6c486cd91ba8c 2006.0/i586/gnupg-1.4.7-0.2.20060mdk.i586.rpm f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
845bfd1f359b7866e73ab2eb8b30b8fe 2006.0/x86_64/gnupg-1.4.7-0.2.20060mdk.x86_64.rpm f30ab12655598264c10cee92ed76c951 2006.0/SRPMS/gnupg-1.4.7-0.2.20060mdk.src.rpm
Mandriva Linux 2007
c1b40e8866482c368aab5df228093ab3 2007.0/i586/gnupg-1.4.7-0.2mdv2007.0.i586.rpm 9dbf1a7a48aecb2ece048b47f4c7ade9 2007.0/i586/libgpgme11-1.1.2-2.1mdv2007.0.i586.rpm 3809f32ed3708606e6318fb7feed230d 2007.0/i586/libgpgme11-devel-1.1.2-2.1mdv2007.0.i586.rpm 62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm 31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
d5339dd2bc4146dd18c2ab3b4eca028d 2007.0/x86_64/gnupg-1.4.7-0.2mdv2007.0.x86_64.rpm 608bd0a86d6f83927466f23e7d73fa8d 2007.0/x86_64/lib64gpgme11-1.1.2-2.1mdv2007.0.x86_64.rpm 915d2d203fa41ce12bc661d1a89d563b 2007.0/x86_64/lib64gpgme11-devel-1.1.2-2.1mdv2007.0.x86_64.rpm 62d991ccd15ca77ed37ccd4ca1bedba7 2007.0/SRPMS/gnupg-1.4.7-0.2mdv2007.0.src.rpm 31357e977acd83d777df2d77c22094f6 2007.0/SRPMS/gpgme-1.1.2-2.1mdv2007.0.src.rpm
Corporate Server 4.0
e39b79ee6122b17eaefa4abb7eec8d05 corporate/4.0/i586/gnupg-1.4.7-0.2.20060mlcs4.i586.rpm 16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm
Corporate Server 4.0/X86_64
810b054fed4d7c0b2c8605bb7c3efdca corporate/4.0/x86_64/gnupg-1.4.7-0.2.20060mlcs4.x86_64.rpm 16926c5d72457c65d89124c1ebd7d0b9 corporate/4.0/SRPMS/gnupg-1.4.7-0.2.20060mlcs4.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.