|
|
Subscribe / Log in / New account

Mageia alert MGASA-2014-0276 (gnupg, gnupg2)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2014-0276: Updated gnupg & gnupg2 packages fixes CVE-2014-4617
Date:  Fri, 27 Jun 2014 17:09:00 +0200
Message-ID:  <20140627150900.3436A53EFE@valstar.mageia.org>

MGASA-2014-0276 - Updated gnupg & gnupg2 packages fixes CVE-2014-4617 Publication date: 27 Jun 2014 URL: http://advisories.mageia.org/MGASA-2014-0276.html Type: security Affected Mageia releases: 3, 4 CVE: CVE-2014-4617 Description: Updated gnupg and gnupg2 packages fix security vulnerability: GnuPG versions before 1.4.17 and 2.0.24 are vulnerable to a denial of service which can be caused by garbled compressed data packets which may put gpg into an infinite loop (CVE-2014-4617). References: - http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/00... - http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/00... - http://openwall.com/lists/oss-security/2014/06/24/14 - https://bugs.mageia.org/show_bug.cgi?id=13590 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617 SRPMS: - 4/core/gnupg-1.4.16-1.1.mga4 - 4/core/gnupg2-2.0.22-3.1.mga4 - 3/core/gnupg-1.4.14-1.3.mga3 - 3/core/gnupg2-2.0.19-3.3.mga3


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds