Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59334
Category:Fedora Local Security Checks
Title:Fedora Core 5 FEDORA-2006-755 (gnupg)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gnupg
announced via advisory FEDORA-2006-755.

GnuPG (GNU Privacy Guard) is a GNU utility for encrypting data and
creating digital signatures. GnuPG has advanced key management
capabilities and is compliant with the proposed OpenPGP Internet
standard described in RFC2440. Since GnuPG doesn't use any patented
algorithm, it is not compatible with any version of PGP2 (PGP2.x uses
only IDEA for symmetric-key encryption, which is patented worldwide).

Update Information:

This update upgrades to upstream version 1.4.4, which places
a limit on the size of user ID packets, closing a possible
integer overflow (CVE-2006-3082).
* Mon Jun 26 2006 Nalin Dahyabhai - 1.4.4-2
- rebuild
* Mon Jun 26 2006 Nalin Dahyabhai - 1.4.4-1
- update to 1.4.4
* Tue Jun 20 2006 Nalin Dahyabhai - 1.4.3-5
- rebuild
* Tue Jun 20 2006 Nalin Dahyabhai - 1.4.3-4
- add patch from upstream to fix CVE-2006-3082 (#195946)

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2006-755

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-3082
BugTraq ID: 18554
http://www.securityfocus.com/bid/18554
Bugtraq: 20060629 rPSA-2006-0120-1 gnupg (Google Search)
http://www.securityfocus.com/archive/1/438751/100/0/threaded
Debian Security Information: DSA-1107 (Google Search)
http://www.debian.org/security/2006/dsa-1107
Debian Security Information: DSA-1115 (Google Search)
http://www.debian.org/security/2006/dsa-1115
http://seclists.org/lists/fulldisclosure/2006/May/0774.html
http://seclists.org/lists/fulldisclosure/2006/May/0782.html
http://seclists.org/lists/fulldisclosure/2006/May/0789.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:110
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.010.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10089
http://www.redhat.com/support/errata/RHSA-2006-0571.html
http://securitytracker.com/id?1016519
http://secunia.com/advisories/20783
http://secunia.com/advisories/20801
http://secunia.com/advisories/20811
http://secunia.com/advisories/20829
http://secunia.com/advisories/20881
http://secunia.com/advisories/20899
http://secunia.com/advisories/20968
http://secunia.com/advisories/21063
http://secunia.com/advisories/21135
http://secunia.com/advisories/21137
http://secunia.com/advisories/21143
http://secunia.com/advisories/21585
SGI Security Advisory: 20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.457382
SuSE Security Announcement: SUSE-SR:2006:015 (Google Search)
http://www.novell.com/linux/security/advisories/2006_38_security.html
SuSE Security Announcement: SUSE-SR:2006:018 (Google Search)
http://www.novell.com/linux/security/advisories/2006_18_sr.html
https://usn.ubuntu.com/304-1/
http://www.vupen.com/english/advisories/2006/2450
XForce ISS Database: gnupg-parsepacket-bo(27245)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27245
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.