Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
SuSE Update for gpg SUSE-SA:2007:024
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Check for the Version of gpg
Insight
Insight
When printing a text stream with a GPG signature it was possible for an attacker to create a stream with " unsigned text, signed text" where both unsigned and signed text would be shown without distinction which one was signed and which part wasn't. This problem is tracked by the Mitre CVE ID CVE-2007-1263. The update introduces a new option --allow-multiple-messages to print out such messages in the future, by default it only prints and handles the first one. gpg2 and various clients using GPG to check digital signatures are affected too, but will be fixed separately.
Affected Software
Affected Software
gpg on SUSE LINUX 10.1, openSUSE 10.2, SuSE Linux Enterprise Server 8, SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9, SUSE SLED 10, SUSE SLES 10
Solution
Solution
Please Install the Updated Packages.